vulnerability

Red Hat: CVE-2022-2393: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (Multiple Advisories)

Severity
6
CVSS
(AV:A/AC:L/Au:S/C:C/I:P/A:N)
Published
Jul 14, 2022
Added
Oct 25, 2022
Modified
Sep 16, 2025

Description

A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.

Solutions

no-fix-redhat-rpm-packageredhat-upgrade-idm-jssredhat-upgrade-idm-jss-debuginforedhat-upgrade-idm-ldapjdkredhat-upgrade-idm-pki-acmeredhat-upgrade-idm-pki-baseredhat-upgrade-idm-pki-caredhat-upgrade-idm-pki-estredhat-upgrade-idm-pki-javaredhat-upgrade-idm-pki-kraredhat-upgrade-idm-pki-serverredhat-upgrade-idm-pki-toolsredhat-upgrade-idm-tomcatjssredhat-upgrade-jssredhat-upgrade-jss-debuginforedhat-upgrade-jss-debugsourceredhat-upgrade-jss-javadocredhat-upgrade-ldapjdkredhat-upgrade-ldapjdk-javadocredhat-upgrade-pki-acmeredhat-upgrade-pki-baseredhat-upgrade-pki-base-javaredhat-upgrade-pki-caredhat-upgrade-pki-core-debuginforedhat-upgrade-pki-core-debugsourceredhat-upgrade-pki-javadocredhat-upgrade-pki-kraredhat-upgrade-pki-serverredhat-upgrade-pki-symkeyredhat-upgrade-pki-symkey-debuginforedhat-upgrade-pki-toolsredhat-upgrade-pki-tools-debuginforedhat-upgrade-python3-idm-pkiredhat-upgrade-python3-pkiredhat-upgrade-tomcatjss
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.