CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
access.redhat.com/errata/RHSA-2023:4701
access.redhat.com/errata/RHSA-2023:4702
access.redhat.com/errata/RHSA-2023:4703
access.redhat.com/errata/RHSA-2023:4704
access.redhat.com/errata/RHSA-2023:4705
access.redhat.com/errata/RHSA-2023:4706
access.redhat.com/errata/RHSA-2023:4707
access.redhat.com/errata/RHSA-2023:4708
access.redhat.com/security/cve/CVE-2023-3899
bugzilla.redhat.com/show_bug.cgi?id=2225407
lists.fedoraproject.org/archives/list/[email protected]/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/
lists.fedoraproject.org/archives/list/[email protected]/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/