A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.re
A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by…
| Vendor | Product | Versions |
|---|---|---|
| Red Hat | Red Hat Enterprise Linux 7 | 0:1.24.52-2.el7_9 |
| Red Hat | Red Hat Enterprise Linux 8 | 0:1.28.36-3.el8_8 |
| Red Hat | Red Hat Enterprise Linux 8 | 0:1.28.36-3.el8_8 |
| Red Hat | Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | 0:1.25.17.1-2.el8_1 |
| Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | 0:1.26.22-2.el8_2 |
| Red Hat | Red Hat Enterprise Linux 8.2 Telecommunications Update Service | 0:1.26.22-2.el8_2 |
| Red Hat | Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions | 0:1.26.22-2.el8_2 |
| Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | 0:1.28.13-7.el8_4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Telecommunications Update Service | 0:1.28.13-7.el8_4 |
| Red Hat | Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions | 0:1.28.13-7.el8_4 |
| Red Hat | Red Hat Enterprise Linux 8.6 Extended Update Support | 0:1.28.29.1-2.el8_6 |
| Red Hat | Red Hat Enterprise Linux 9 | 0:1.29.33.1-2.el9_2 |
| Red Hat | Red Hat Enterprise Linux 9.0 Extended Update Support | 0:1.29.26.2-2.el9_0 |
| Red Hat | Red Hat Enterprise Linux 6 | unspecified |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.