Lucene search

K
cvelistSuseCVELIST:CVE-2022-31254
HistoryFeb 07, 2023 - 12:00 a.m.

CVE-2022-31254 rmt-server-pubcloud allows to escalate from user _rmt to root

2023-02-0700:00:00
CWE-276
suse
www.cve.org
6
cve-2022-31254
rmt-server-pubcloud
incorrect default permissions
suse linux enterprise server for sap 15
suse linux enterprise server for sap 15-sp1
suse manager server 4.1
opensuse leap 15.3
opensuse leap 15.4
local attackers
_rmt user
escalate to root

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

5.1%

A Incorrect Default Permissions vulnerability in rmt-server-regsharing service of SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.1; openSUSE Leap 15.3, openSUSE Leap 15.4 allows local attackers with access to the _rmt user to escalate to root. This issue affects: SUSE Linux Enterprise Server for SAP 15 rmt-server versions prior to 2.10. SUSE Linux Enterprise Server for SAP 15-SP1 rmt-server versions prior to 2.10. SUSE Manager Server 4.1 rmt-server versions prior to 2.10. openSUSE Leap 15.3 rmt-server versions prior to 2.10. openSUSE Leap 15.4 rmt-server versions prior to 2.10.

CNA Affected

[
  {
    "vendor": "SUSE",
    "product": "SUSE Linux Enterprise Server for SAP 15",
    "versions": [
      {
        "version": "rmt-server",
        "status": "affected",
        "lessThan": "2.10",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "SUSE",
    "product": "SUSE Linux Enterprise Server for SAP 15-SP1",
    "versions": [
      {
        "version": "rmt-server",
        "status": "affected",
        "lessThan": "2.10",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "SUSE",
    "product": "SUSE Manager Server 4.1",
    "versions": [
      {
        "version": "rmt-server",
        "status": "affected",
        "lessThan": "2.10",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "openSUSE",
    "product": "openSUSE Leap 15.3",
    "versions": [
      {
        "version": "rmt-server",
        "status": "affected",
        "lessThan": "2.10",
        "versionType": "custom"
      }
    ]
  },
  {
    "vendor": "openSUSE",
    "product": "openSUSE Leap 15.4",
    "versions": [
      {
        "version": "rmt-server",
        "status": "affected",
        "lessThan": "2.10",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVELIST:CVE-2022-31254