8.1
CVSSv3

CVE-2017-2590

Published: 27/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

A vulnerability was found in ipa prior to 4.4. IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freeipa freeipa

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.3

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.3

redhat enterprise linux workstation 7.0

Vendor Advisories

Synopsis Moderate: ipa security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for ipa is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score ...
It was found that IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys ...