Description
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- local
- Complexity
- high
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- OPENBSD
- Published
- 9/26/2021
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
openbsd : opensshfedoraproject : fedorafedoraproject : fedorafedoraproject : fedoranetapp : active_iq_unified_managernetapp : clustered_data_ontapnetapp : hci_management_nodenetapp : ontap_select_deploy_administration_utilitynetapp : solidfirenetapp : aff_a250_firmwarenetapp : aff_500f_firmwareoracle : http_serveroracle : http_serveroracle : http_serveroracle : zfs_storage_appliance_kitstarwindsoftware : starwind_virtual_san
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.