Vulnerability Name: | CVE-2021-4034 (CCN-218087) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2021-11-29 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2022-01-25 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-4034 Source: secalert@redhat.com Type: Exploit, Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: secalert@redhat.com Type: Mitigation, Vendor Advisory secalert@redhat.com Source: CCN Type: Red Hat Bugzilla - Bug 2025869 (CVE-2021-4034) - CVE-2021-4034 polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector Source: secalert@redhat.com Type: Issue Tracking, Patch, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN polkit-cve20214034-priv-esc(218087) Source: CCN Type: polkit GitLab polkit Source: CCN Type: polkit GIT Repository pkexec: local privilege escalation (CVE-2021-4034) Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: Packet Storm Security [01-26-2022] Polkit pkexec CVE-2021-4034 Local Root Source: CCN Type: Packet Storm Security [01-26-2022] Polkit pkexec CVE-2021-4034 Proof Of Concept Source: CCN Type: Packet Storm Security [01-26-2022] Polkit pkexec CVE-2021-4034 Local Root Source: CCN Type: Packet Storm Security [01-27-2022] PolicyKit-1 0.105-31 Privilege Escalation Source: CCN Type: Packet Storm Security [03-03-2022] Polkit pkexec Local Privilege Escalation Source: CCN Type: Packet Storm Security [03-04-2022] Polkit pkexec Privilege Escalation Source: CCN Type: oss-sec Mailing List, Tue, 25 Jan 2022 17:57:48 +0000 pwnkit: Local Privilege Escalation in polkit's pkexec (CVE-2021-4034) Source: CCN Type: ICSA-22-270-02 Hitachi Energy APM Edge Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [01-27-2022] Source: CCN Type: IBM Security Bulletin 6552330 (Netezza PDA OS Security) Publicly disclosed vulnerability (CVE-2021-4034) in Polkit affects IBM Netezza PDA OS Security Source: CCN Type: IBM Security Bulletin 6556444 (Integrated Analytics System) Vulnerability in Polkit affects IBM Integrated Analytics System. Source: CCN Type: IBM Security Bulletin 6556738 (App Connect Professional) App Connect Professional is affected by polkit's pkexec vulnerability Source: CCN Type: IBM Security Bulletin 6557048 (Cloud Pak for Data System) Vulnerability in Polkit affects IBM Cloud Pak for Data System 1.0 Source: CCN Type: IBM Security Bulletin 6557222 (Cloud Pak for Data System) Vulnerability in Polkit affects IBM Cloud Pak for Data System 2.0. Source: CCN Type: IBM Security Bulletin 6557426 (QRadar SIEM) Polkit as used by IBM QRadar SIEM is vulnerable to privilege escalation (CVE-2021-4034) Source: CCN Type: IBM Security Bulletin 6562471 (Spectrum Copy Data Management) Vulnerabilities in Polkit, PostgreSQL, OpenSSL, OpenSSH, and jQuery affect IBM Spectrum Copy Data Management Source: CCN Type: IBM Security Bulletin 6562843 (Spectrum Protect Plus) Vulnerabilities in Polkit, Node.js, OpenSSH, and Golang Go affect IBM Spectrum Protect Plus (CVE-2021-4034, CVE-2022-21681, CVE-2022-21680, CVE-2022-0235, CVE-2021-41617, CVE-2021-44716, CVE-2021-44717, 218243) Source: CCN Type: IBM Security Bulletin 6568365 (QRadar Network Packet Capture) IBM QRadar Network Packet Capture is using components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6572981 (Security Guardium) IBM Security Guardium is affected by a PolicyKit vulnerability (CVE-2021-4034) Source: CCN Type: IBM Security Bulletin 6583163 (TS7700 virtual tape systems) TS3000 (TSSC/IMC) is vulnerable to privilege escalation vulnerability due to polkit ( CVE-2021-4034 ) Source: CCN Type: IBM Security Bulletin 6611089 (Cloud Pak System) Vulnerability in polkit affects Cloud Pak System ( CVE-2021-4034) Source: CCN Type: Mend Vulnerability Database CVE-2021-4034 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Exploit, Mitigation, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |