CVE-2023-26604
CVE Details
Visit the official vulnerability details page for CVE-2023-26604 to learn more.
Initial Publication
10/25/2024
Last Update
12/16/2024
Third Party Dependency
libsystemd0
NIST CVE Summary
systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
CVE Severity
Our Official Summary
A vulnerability was found in the systemd package. The systemd package does not adequately block local privilege escalation for some Sudo configurations, for example, plausible sudoers files, in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This issue presents a substantial security risk when running systemctl from Sudo because less executes as root when the terminal size is too small to show the complete systemctl output.
This is reported on a few of the third party images for which an upstream fix is not available. Probability of exploitation is less likely as attackers need privileged access to these containers and sufficient controls are in place to prevent that. We will wait for the upstream fix to become available.
Status
Ongoing
Affected Products & Versions
Version | Palette Enterprise | Palette Enterprise Airgap | VerteX | VerteX Airgap |
---|---|---|---|---|
4.5.15 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
4.5.11 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
4.5.10 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
4.5.8 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
4.5.5 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
4.5.4 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
4.4.20 | ⚠️ Impacted | ⚠️ Impacted | ⚠️ Impacted | ⚠️ Impacted |
Revision History
Date | Revision |
---|---|
12/16/2024 | Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11, 4.5.15 |
12/11/2024 | Official summary revised: A vulnerability was found in the systemd package. The systemd package does not adequately block local privilege escalation for some Sudo configurations, for example, plausible sudoers files, in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This issue presents a substantial security risk when running systemctl from Sudo because less executes as root when the terminal size is too small to show the complete systemctl output.This is reported on a few of the third party images for which an upstream fix is not available. Probability of exploitation is less likely as attackers need privileged access to thesecontainers and sufficient controls are in place to prevent that. We will wait for the upstream fix to become available. |
11/15/2024 | Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10, 4.5.11 |
11/15/2024 | Impacted versions changed from 4.5.4, 4.5.5, 4.5.8, 4.4.20 to 4.5.4, 4.5.5, 4.5.8, 4.4.20, 4.5.10 |
11/13/2024 | Impacted versions changed from 4.5.4, 4.5.5, 4.5.8 to 4.5.4, 4.5.5, 4.5.8, 4.4.20 |
11/10/2024 | Impacted versions changed from 4.5.4, 4.5.5 to 4.5.4, 4.5.5, 4.5.8 |
10/27/2024 | Impacted versions changed from 4.5.4 to 4.5.4, 4.5.5 |