Vulnerability Name: | CVE-2021-20179 (CCN-198271) | ||||||||||||||||||
Assigned: | 2020-12-17 | ||||||||||||||||||
Published: | 2021-03-12 | ||||||||||||||||||
Updated: | 2021-03-24 | ||||||||||||||||||
Summary: | A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity. | ||||||||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) 7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
7.1 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 5.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
| ||||||||||||||||||
Vulnerability Type: | CWE-863 CWE-863 | ||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-20179 Source: CCN Type: Red Hat Bugzilla - Bug 1914379 (CVE-2021-20179) - CVE-2021-20179 pki-core: Unprivileged users can renew any certificate Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1914379 Source: XF Type: UNKNOWN dogtag-cve202120179-sec-bypass(198271) Source: CCN Type: pki GIT Repository CVE-2021-20179: Fix renewal profile approval process - v10.11 #3474 Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/pull/3474 Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/pull/3475 Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/pull/3476 Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/pull/3477 Source: MISC Type: Patch, Third Party Advisory https://github.com/dogtagpki/pki/pull/3478 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-6c412a4601 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-344dd24c84 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-c0d6637ca5 | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |