Unknown
CVE-2023-3899
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-3899
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- fedoraproject,
- redhat
Products
- enterprise linux 8.0,
- enterprise linux 9.0,
- enterprise linux desktop 7.0,
- enterprise linux eus 8.6,
- enterprise linux eus 8.8,
- enterprise linux eus 9.0,
- enterprise linux eus 9.2,
- enterprise linux for arm 64 8.0,
- enterprise linux for arm 64 9.0,
- enterprise linux for arm 64 9.2,
- enterprise linux for arm 64 eus 8.6,
- enterprise linux for arm 64 eus 8.8,
- enterprise linux for arm 64 eus 9.0,
- enterprise linux for arm 64 eus 9.2,
- enterprise linux for ibm z systems 7.0,
- enterprise linux for ibm z systems 8.0,
- enterprise linux for ibm z systems 9.0,
- enterprise linux for ibm z systems 9.2,
- enterprise linux for ibm z systems eus 8.6,
- enterprise linux for ibm z systems eus 8.8,
- enterprise linux for ibm z systems eus 9.0,
- enterprise linux for ibm z systems eus 9.2,
- enterprise linux for power big endian 7.0,
- enterprise linux for power little endian 7.0,
- enterprise linux for power little endian 8.0,
- enterprise linux for power little endian 9.0,
- enterprise linux for power little endian eus 8.8,
- enterprise linux for power little endian eus 9.0,
- enterprise linux for power little endian eus 9.2,
- enterprise linux for scientific computing 7.0,
- enterprise linux server 7.0,
- enterprise linux server aus 8.2,
- enterprise linux server aus 8.4,
- enterprise linux server aus 8.6,
- enterprise linux server aus 9.2,
- enterprise linux server for power little endian update services for sap solutions 8.1,
- enterprise linux server for power little endian update services for sap solutions 8.2,
- enterprise linux server for power little endian update services for sap solutions 8.4,
- enterprise linux server for power little endian update services for sap solutions 8.6,
- enterprise linux server for power little endian update services for sap solutions 8.8,
- enterprise linux server for power little endian update services for sap solutions 9.0,
- enterprise linux server for power little endian update services for sap solutions 9.2,
- enterprise linux server tus 8.2,
- enterprise linux server tus 8.4,
- enterprise linux server tus 8.6,
- enterprise linux server tus 8.8,
- enterprise linux server update services for sap solutions 9.0,
- enterprise linux server update services for sap solutions 9.2,
- enterprise linux update services for sap solutions 8.1,
- enterprise linux update services for sap solutions 8.2,
- enterprise linux update services for sap solutions 8.4,
- enterprise linux update services for sap solutions 8.6,
- enterprise linux update services for sap solutions 8.8,
- enterprise linux workstation 7.0,
- fedora 37,
- fedora 38,
- subscription-manager
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: