vulnerability
Red Hat: CVE-2021-3560: local privilege escalation using polkit_system_bus_name_get_creds_sync() (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Jun 3, 2021 | Jun 4, 2021 | Aug 11, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jun 3, 2021
Added
Jun 4, 2021
Modified
Aug 11, 2025
Description
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Solutions
redhat-upgrade-polkitredhat-upgrade-polkit-debuginforedhat-upgrade-polkit-debugsourceredhat-upgrade-polkit-develredhat-upgrade-polkit-docsredhat-upgrade-polkit-libsredhat-upgrade-polkit-libs-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.