Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-4948

Опубликовано: 27 мар. 2026
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.

Меры по смягчению последствий

To mitigate this issue, ensure that the firewalld desktop policy is not active on systems where local unprivileged user access is a concern. If firewalld is not required, it can be disabled. Disabling firewalld may impact network services that rely on it. To disable firewalld: sudo systemctl stop firewalld sudo systemctl disable firewalld A system restart or service reload may be required for changes to take full effect.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10firewalldUnder investigation
Red Hat Enterprise Linux 7firewalldFix deferred
Red Hat Enterprise Linux 8firewalldUnder investigation
Red Hat Enterprise Linux 9firewalldUnder investigation
Red Hat OpenShift Container Platform 4rhcosUnder investigation

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-279
https://bugzilla.redhat.com/show_bug.cgi?id=2452086firewalld: firewalld: Local unprivileged user can modify firewall state due to D-Bus setter mis-authorization

EPSS

Процентиль: 5%
0.0002
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
13 дней назад

A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.

CVSS3: 5.5
nvd
13 дней назад

A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.

CVSS3: 5.5
debian
13 дней назад

A flaw was found in firewalld. A local unprivileged user can exploit t ...

CVSS3: 5.5
github
13 дней назад

A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.

EPSS

Процентиль: 5%
0.0002
Низкий

5.5 Medium

CVSS3