9.8
CVE-2022-4039
- EPSS 0.12%
- Published 22.09.2023 15:15:09
- Last modified 21.11.2024 07:34:29
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
Data is provided by the National Vulnerability Database (NVD)
Redhat ≫ Single Sign-on Version7.0
Redhat ≫ Openshift Container Platform Version4.9
Redhat ≫ Openshift Container Platform Version4.10
Redhat ≫ Openshift Container Platform For Ibm Z Version4.9
Redhat ≫ Openshift Container Platform For Ibm Z Version4.10
Redhat ≫ Openshift Container Platform For Linuxone Version4.9
Redhat ≫ Openshift Container Platform For Linuxone Version4.10
Redhat ≫ Openshift Container Platform For Power Version4.9
Redhat ≫ Openshift Container Platform For Power Version4.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.12% | 0.281 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
secalert@redhat.com | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-276 Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.