Vulnerability Details : CVE-2021-41617
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
Vulnerability category: Gain privilege
Exploit prediction scoring system (EPSS) score for CVE-2021-41617
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 21 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-41617
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
[email protected] |
7.0
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
[email protected] |
References for CVE-2021-41617
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
Mailing List;Third Party Advisory
-
https://www.openwall.com/lists/oss-security/2021/09/26/1
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
Mailing List;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpuapr2022.html
Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
Mailing List;Third Party Advisory
-
https://www.openssh.com/security.html
Vendor Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=1190975
Issue Tracking;Patch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20211014-0004/
Third Party Advisory
-
https://www.tenable.com/plugins/nessus/154174
-
https://www.oracle.com/security-alerts/cpujul2022.html
Third Party Advisory
-
https://www.starwindsoftware.com/security/sw-20220805-0001/
Third Party Advisory
-
https://www.openssh.com/txt/release-8.8
Release Notes;Vendor Advisory
Products affected by CVE-2021-41617
- cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
- cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
- cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8r13:14398:*:*:*:*:*:*