vulnerability
Red Hat: CVE-2022-3287: fwupd: world readable password in /etc/fwupd/redfish.conf (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:C/I:N/A:N) | 2022-09-28 | 2023-05-15 | 2025-01-28 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:C/I:N/A:N)
Published
2022-09-28
Added
2023-05-15
Modified
2025-01-28
Description
When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
Solution(s)
redhat-upgrade-fwupdredhat-upgrade-fwupd-debuginforedhat-upgrade-fwupd-debugsourceredhat-upgrade-fwupd-develredhat-upgrade-fwupd-plugin-flashromredhat-upgrade-fwupd-plugin-flashrom-debuginforedhat-upgrade-fwupd-tests-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.