Vulnerability Description
An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kernel | Util-Linux | < 2.27 |
Related Weaknesses (CWE)
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804ExploitMailing ListPatch
- https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.htmlExploitThird Party AdvisoryVDB Entry
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804ExploitMailing ListPatch
- https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.htmlExploitThird Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20241220-0006/
FAQ
What is CVE-2020-21583?
CVE-2020-21583 is a vulnerability with a CVSS score of 6.7 (MEDIUM). An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date.
How severe is CVE-2020-21583?
CVE-2020-21583 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-21583?
Check the references section above for vendor advisories and patch information. Affected products include: Kernel Util-Linux.