vulnerability
Red Hat: CVE-2022-2393: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:S/C:C/I:P/A:N) | Jul 14, 2022 | Oct 25, 2022 | Sep 16, 2025 |
Severity
6
CVSS
(AV:A/AC:L/Au:S/C:C/I:P/A:N)
Published
Jul 14, 2022
Added
Oct 25, 2022
Modified
Sep 16, 2025
Description
A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-idm-jssredhat-upgrade-idm-jss-debuginforedhat-upgrade-idm-ldapjdkredhat-upgrade-idm-pki-acmeredhat-upgrade-idm-pki-baseredhat-upgrade-idm-pki-caredhat-upgrade-idm-pki-estredhat-upgrade-idm-pki-javaredhat-upgrade-idm-pki-kraredhat-upgrade-idm-pki-serverredhat-upgrade-idm-pki-toolsredhat-upgrade-idm-tomcatjssredhat-upgrade-jssredhat-upgrade-jss-debuginforedhat-upgrade-jss-debugsourceredhat-upgrade-jss-javadocredhat-upgrade-ldapjdkredhat-upgrade-ldapjdk-javadocredhat-upgrade-pki-acmeredhat-upgrade-pki-baseredhat-upgrade-pki-base-javaredhat-upgrade-pki-caredhat-upgrade-pki-core-debuginforedhat-upgrade-pki-core-debugsourceredhat-upgrade-pki-javadocredhat-upgrade-pki-kraredhat-upgrade-pki-serverredhat-upgrade-pki-symkeyredhat-upgrade-pki-symkey-debuginforedhat-upgrade-pki-toolsredhat-upgrade-pki-tools-debuginforedhat-upgrade-python3-idm-pkiredhat-upgrade-python3-pkiredhat-upgrade-tomcatjss
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.