vulnerability
Red Hat: CVE-2022-3287: fwupd: world readable password in /etc/fwupd/redfish.conf (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:C/I:N/A:N) | Sep 28, 2022 | May 15, 2023 | Jan 28, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:C/I:N/A:N)
Published
Sep 28, 2022
Added
May 15, 2023
Modified
Jan 28, 2025
Description
When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
Solution(s)
redhat-upgrade-fwupdredhat-upgrade-fwupd-debuginforedhat-upgrade-fwupd-debugsourceredhat-upgrade-fwupd-develredhat-upgrade-fwupd-plugin-flashromredhat-upgrade-fwupd-plugin-flashrom-debuginforedhat-upgrade-fwupd-tests-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.