Vulnerability Details : CVE-2024-6126
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.
Vulnerability category: Denial of service
Products affected by CVE-2024-6126
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-6126
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 3 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-6126
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.2
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L |
1.5
|
1.4
|
Red Hat, Inc. | 2024-07-03 |
3.2
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L |
N/A
|
N/A
|
RedHat-CVE-2024-6126 | 2024-07-03 |
CWE ids for CVE-2024-6126
-
The product does not properly control the allocation and maintenance of a limited resource.Assigned by: secalert@redhat.com (Primary)
References for CVE-2024-6126
-
https://access.redhat.com/security/cve/CVE-2024-6126
CVE-2024-6126- Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:9325
RHSA-2024:9325 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=2292897
2292897 – (CVE-2024-6126) CVE-2024-6126 cockpit: Authenticated user can kill any process when enabling pam_env's user_readenv option
Jump to