Vulnerability Description
It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Dogtagpki | Dogtagpki | < 10.6.4 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2017:2335Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7537ExploitIssue TrackingPatch
- https://github.com/dogtagpki/pki/commit/876d13c6d20e7e1235b9PatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2335Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7537ExploitIssue TrackingPatch
- https://github.com/dogtagpki/pki/commit/876d13c6d20e7e1235b9PatchThird Party Advisory
FAQ
What is CVE-2017-7537?
CVE-2017-7537 is a vulnerability with a CVSS score of 5.9 (MEDIUM). It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to byp...
How severe is CVE-2017-7537?
CVE-2017-7537 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7537?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation, Dogtagpki Dogtagpki.