CVE-2021-3560

EUVD-2021-26871
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
Affected Products (NVD)
VendorProductVersion
polkit_projectpolkit
𝑥
< 0.119
debiandebian_linux
11.0
canonicalubuntu_linux
20.04
redhatvirtualization
4.0
redhatvirtualization_host
4.0
redhatopenshift_container_platform
4.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
policykit-1
bookworm
122-3
fixed
bullseye
0.105-31+deb11u1
fixed
bullseye (security)
0.105-31+deb11u1
fixed
buster
not-affected
sid
125-2
fixed
stretch
not-affected
trixie
125-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
policykit-1
bionic
not-affected
focal
Fixed 0.105-26ubuntu1.1
released
groovy
Fixed 0.105-29ubuntu0.1
released
hirsute
Fixed 0.105-30ubuntu0.1
released
impish
Fixed 0.105-31
released
jammy
Fixed 0.105-31
released
trusty
not-affected
xenial
not-affected