HIGH · 8.8

CVE-2021-3621

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into r...

Vulnerability Description

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
FedoraprojectSssd2.6.0
RedhatVirtualization4.0
RedhatVirtualization Host4.0
RedhatEnterprise Linux6.0
RedhatEnterprise Linux Eus8.1
RedhatEnterprise Linux Server Aus8.2
RedhatEnterprise Linux Server Tus8.2
FedoraprojectFedora34

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-3621?

CVE-2021-3621 is a vulnerability with a CVSS score of 8.8 (HIGH). A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into r...

How severe is CVE-2021-3621?

CVE-2021-3621 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2021-3621?

Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Sssd, Redhat Virtualization, Redhat Virtualization Host, Redhat Enterprise Linux, Redhat Enterprise Linux Eus.