Unknown
CVE-2021-3551
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-3551
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- dogtagpki,
- fedoraproject,
- oracle,
- redhat
Products
- dogtagpki,
- enterprise linux 8.0,
- enterprise linux eus 8.4,
- enterprise linux for ibm z systems 8.0,
- enterprise linux for ibm z systems eus 8.4,
- enterprise linux for power little endian 8.0,
- enterprise linux for power little endian eus 8.4,
- enterprise linux server aus 8.4,
- enterprise linux server tus 8.4,
- enterprise linux server update services for sap solutions 8.4,
- fedora 33,
- fedora 34,
- linux 8
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: