vulnerability
Red Hat: CVE-2022-2393: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:S/C:C/I:P/A:N) | Jul 14, 2022 | Oct 25, 2022 | Feb 20, 2026 |
Severity
6
CVSS
(AV:A/AC:L/Au:S/C:C/I:P/A:N)
Published
Jul 14, 2022
Added
Oct 25, 2022
Modified
Feb 20, 2026
Description
A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
Solutions
redhat-upgrade-idm-jssredhat-upgrade-idm-jss-debuginforedhat-upgrade-idm-ldapjdkredhat-upgrade-idm-pki-acmeredhat-upgrade-idm-pki-baseredhat-upgrade-idm-pki-caredhat-upgrade-idm-pki-estredhat-upgrade-idm-pki-javaredhat-upgrade-idm-pki-kraredhat-upgrade-idm-pki-serverredhat-upgrade-idm-pki-toolsredhat-upgrade-idm-tomcatjssredhat-upgrade-jssredhat-upgrade-jss-debuginforedhat-upgrade-jss-debugsourceredhat-upgrade-jss-javadocredhat-upgrade-ldapjdkredhat-upgrade-ldapjdk-javadocredhat-upgrade-pki-acmeredhat-upgrade-pki-baseredhat-upgrade-pki-base-javaredhat-upgrade-pki-caredhat-upgrade-pki-core-debuginforedhat-upgrade-pki-core-debugsourceredhat-upgrade-pki-javadocredhat-upgrade-pki-kraredhat-upgrade-pki-serverredhat-upgrade-pki-symkeyredhat-upgrade-pki-symkey-debuginforedhat-upgrade-pki-toolsredhat-upgrade-pki-tools-debuginforedhat-upgrade-python3-idm-pkiredhat-upgrade-python3-pkiredhat-upgrade-tomcatjss
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.