4.3
CVSSv2

CVE-2018-20839

Published: 17/05/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

systemd 242 changes the VT1 mode upon a logout, which allows malicious users to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemd project systemd 242

netapp cn1610_firmware -

netapp solidfire \\& hci management node -

netapp snapprotect -

Vendor Advisories

Debian Bug report logs - #929116 systemd: CVE-2018-20839 Package: src:systemd; Maintainer for src:systemd is Debian systemd Maintainers <pkg-systemd-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 17 May 2019 12:15:01 UTC Severity: important Tags: fixed-upstream, ...
Impact: Important Public Date: 2019-05-17 CWE: CWE-200 Bugzilla: 1716955: CVE-2018-20839 systemd: misha ...

Github Repositories

Intro Wazuh and Snyk (snykio) integration to scan Docker image vulnerabilities Snyk will help you find and automatically fix vulnerabilities in your code, open source dependencies, containers, and infrastructure as code In this integration we'll use Snyk’s CLI to scan for vulnerabilities in the Docker images and all their dependencies NOTE: Wazuh can use all the