Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-4105

Опубликовано: 13 мар. 2026
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.7

Описание

A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.

РелизСтатусПримечание
devel

pending

259.5-0ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
jammy

not-affected

code not present
noble

not-affected

code not present
questing

not-affected

code not present
upstream

released

260~rc3-1

Показывать по

EPSS

Процентиль: 5%
0.00019
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
13 дней назад

A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.

CVSS3: 6.7
nvd
12 дней назад

A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.

msrc
9 дней назад

Systemd: systemd: privilege escalation via improper access control in registermachine d-bus method

CVSS3: 6.7
debian
12 дней назад

A flaw was found in systemd. The systemd-machined service contains an ...

EPSS

Процентиль: 5%
0.00019
Низкий

6.7 Medium

CVSS3