Vulnerability Description
A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Subscription-Manager | < 1.28.39 |
| Fedoraproject | Fedora | 37 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Eus | 8.6 |
| Redhat | Enterprise Linux For Arm 64 | 8.0 |
| Redhat | Enterprise Linux For Arm 64 Eus | 8.6 |
| Redhat | Enterprise Linux For Ibm Z Systems | 7.0 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.6 |
| Redhat | Enterprise Linux For Power Big Endian | 7.0 |
| Redhat | Enterprise Linux For Power Little Endian | 7.0 |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.8 |
| Redhat | Enterprise Linux For Scientific Computing | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 8.2 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 8.1 |
| Redhat | Enterprise Linux Server Tus | 8.2 |
| Redhat | Enterprise Linux Server Update Services For Sap Solutions | 9.0 |
| Redhat | Enterprise Linux Update Services For Sap Solutions | 8.1 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2023:4701Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4702Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4703Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4704Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4705Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4706Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4707Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4708Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2023-3899Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2225407Issue TrackingVendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4701Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4702Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4703Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4704Vendor Advisory
- https://access.redhat.com/errata/RHSA-2023:4705Vendor Advisory
FAQ
What is CVE-2023-3899?
CVE-2023-3899 is a vulnerability with a CVSS score of 7.8 (HIGH). A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods t...
How severe is CVE-2023-3899?
CVE-2023-3899 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3899?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Subscription-Manager, Fedoraproject Fedora, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.