CVE-2021-3560

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 91%
VendorProductVersion
polkit_projectpolkit
𝑥
< 0.119
debiandebian_linux
11.0
canonicalubuntu_linux
20.04
redhatvirtualization
4.0
redhatvirtualization_host
4.0
redhatopenshift_container_platform
4.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
policykit-1
bullseye (security)
0.105-31+deb11u1
fixed
bullseye
0.105-31+deb11u1
fixed
buster
not-affected
stretch
not-affected
bookworm
122-3
fixed
sid
125-2
fixed
trixie
125-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
policykit-1
jammy
Fixed 0.105-31
released
impish
Fixed 0.105-31
released
hirsute
Fixed 0.105-30ubuntu0.1
released
groovy
Fixed 0.105-29ubuntu0.1
released
focal
Fixed 0.105-26ubuntu1.1
released
bionic
not-affected
xenial
not-affected
trusty
not-affected