Vulnerability Description
When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fwupd | Fwupd | < 1.8.5 |
Related Weaknesses (CWE)
References
- https://github.com/fwupd/fwupd/commit/ea676855f2119e36d433fbd2ed604039f53b2091PatchThird Party Advisory
- https://github.com/fwupd/fwupd/commit/ea676855f2119e36d433fbd2ed604039f53b2091PatchThird Party Advisory
FAQ
What is CVE-2022-3287?
CVE-2022-3287 is a vulnerability with a CVSS score of 6.5 (MEDIUM). When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read t...
How severe is CVE-2022-3287?
CVE-2022-3287 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3287?
Check the references section above for vendor advisories and patch information. Affected products include: Fwupd Fwupd.