Vulnerability Name: | CVE-2022-2735 (CCN-235096) | ||||||||||||||||||
Assigned: | 2022-09-01 | ||||||||||||||||||
Published: | 2022-09-01 | ||||||||||||||||||
Updated: | 2023-02-12 | ||||||||||||||||||
Summary: | A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS. | ||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
7.4 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
7.4 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||
Vulnerability Type: | CWE-276 | ||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2735 Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN clusterlabs-cve20222735-priv-esc(235096) Source: CCN Type: PCS GIT Repository Pacemaker/Corosync Configuration System Source: CCN Type: oss-sec Mailing List, Thu, 1 Sep 2022 19:30:58 +0530 ClusterLabs/PCS: [CVE-2022-2735] Obtaining an authentication token for hacluster user leads to privilege escalation. Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: Mend Vulnerability Database CVE-2022-2735 Source: secalert@redhat.com Type: Mailing List, Release Notes, Third Party Advisory secalert@redhat.com | ||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |