{"api_version":"1","generated_at":"2026-04-22T23:09:11+00:00","cve":"CVE-2022-24842","urls":{"html":"https://cve.report/CVE-2022-24842","api":"https://cve.report/api/cve/CVE-2022-24842.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24842","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24842"},"summary":{"title":"CVE-2022-24842","description":"MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RELEASE.2022-04-12T06-55-35Z`. Users unable to upgrade may workaround this issue by explicitly adding a `admin:CreateServiceAccount` deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-04-12 18:15:00","updated_at":"2023-07-06 13:51:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://github.com/minio/minio/pull/14729","name":"https://github.com/minio/minio/pull/14729","refsource":"MISC","tags":[],"title":"Fix service account privilege escalation by donatello · Pull Request #14729 · minio/minio · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/minio/minio/commit/66b14a0d32684d527ae8018dc6d9d46ccce58ae3","name":"https://github.com/minio/minio/commit/66b14a0d32684d527ae8018dc6d9d46ccce58ae3","refsource":"MISC","tags":[],"title":"Fix service account privilege escalation (#14729) · minio/minio@66b14a0 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q","name":"https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q","refsource":"CONFIRM","tags":[],"title":"Unprivileged user is able to create service accounts for root or other admin users · Advisory · minio/minio · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24842","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24842","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24842","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"minio","cpe5":"minio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-24842","qid":"691063","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for minio (8e20430d-a72b-11ed-a04f-40b034455553)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24842","STATE":"PUBLIC","TITLE":"Improper Privilege Management in MinIO"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"minio","version":{"version_data":[{"version_value":"< RELEASE.2022-04-12T06-55-35Z"}]}}]},"vendor_name":"minio"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RELEASE.2022-04-12T06-55-35Z`. Users unable to upgrade may workaround this issue by explicitly adding a `admin:CreateServiceAccount` deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269: Improper Privilege Management"}]}]},"references":{"reference_data":[{"name":"https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q","refsource":"CONFIRM","url":"https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q"},{"name":"https://github.com/minio/minio/pull/14729","refsource":"MISC","url":"https://github.com/minio/minio/pull/14729"},{"name":"https://github.com/minio/minio/commit/66b14a0d32684d527ae8018dc6d9d46ccce58ae3","refsource":"MISC","url":"https://github.com/minio/minio/commit/66b14a0d32684d527ae8018dc6d9d46ccce58ae3"}]},"source":{"advisory":"GHSA-2j69-jjmg-534q","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-04-12 18:15:00","lastModifiedDate":"2023-07-06 13:51:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*","versionStartIncluding":"2021-12-09t06-19-41z","versionEndExcluding":"2022-04-12t06-55-35z","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24842","Ordinal":"228313","Title":"CVE-2022-24842","CVE":"CVE-2022-24842","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24842","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}