CVE-2021-3551
Summary
| CVE | CVE-2021-3551 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-16 17:15:00 UTC |
| Updated | 2022-02-28 15:51:00 UTC |
| Description | A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1959971 – (CVE-2021-3551) CVE-2021-3551 pki-server: Dogtag installer "pkispawn" logs admin credentials into a world-readable log file |
MISC |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159243 Oracle Enterprise Linux Security Update for pki-core:10.6 (ELSA-2021-2235)
- 239366 Red Hat Update for pki-core:10.6 (RHSA-2021:2235)
- 281641 Fedora Security Update for dogtag (FEDORA-2021-99ca984f32)
- 281642 Fedora Security Update for dogtag (FEDORA-2021-54a73a7112)
- 377114 Alibaba Cloud Linux Security Update for pki-core:10.6 (ALINUX3-SA-2021:0037)
- 940420 AlmaLinux Security Update for pki-core:10.6 (ALSA-2021:2235)
- 960030 Rocky Linux Security Update for pki-core:10.6 (RLSA-2021:2235)