Vulnerability Description
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From versions 2.0.0-alpha to before 2.3.9 and 3.0.0-alpha to before 3.1.1, there is a conditional local privilege escalation vulnerability in an edge-case naming collision. Only authenticated himmelblau users whose mapped CN/short name exactly matches a privileged local group name (e.g., "sudo", "wheel", "docker", "adm") can cause the NSS module to resolve that group name to their fake primary group. If the system uses NSS results for group-based authorization decisions (sudo, polkit, etc.), this can grant the attacker the privileges of that group. This issue has been patched in versions 2.3.9 and 3.1.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Himmelblau-Idm | Himmelblau | >= 2.0.0, < 2.3.9 |
Related Weaknesses (CWE)
References
- https://github.com/himmelblau-idm/himmelblau/releases/tag/2.3.9ProductRelease Notes
- https://github.com/himmelblau-idm/himmelblau/releases/tag/3.1.1ProductRelease Notes
- https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-v7xx-7mqc-ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-34397?
CVE-2026-34397 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From versions 2.0.0-alpha to before 2.3.9 and 3.0.0-alpha to before 3.1.1, there is a conditional local privilege escal...
How severe is CVE-2026-34397?
CVE-2026-34397 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34397?
Check the references section above for vendor advisories and patch information. Affected products include: Himmelblau-Idm Himmelblau.