vulnerability
Red Hat: CVE-2022-3287: fwupd: world readable password in /etc/fwupd/redfish.conf (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:C/I:N/A:N) | Sep 28, 2022 | May 15, 2023 | Sep 1, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:N)
Published
Sep 28, 2022
Added
May 15, 2023
Modified
Sep 1, 2025
Description
When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
Solutions
redhat-upgrade-fwupdredhat-upgrade-fwupd-debuginforedhat-upgrade-fwupd-debugsourceredhat-upgrade-fwupd-develredhat-upgrade-fwupd-plugin-flashromredhat-upgrade-fwupd-plugin-flashrom-debuginforedhat-upgrade-fwupd-tests-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.