CVE-2022-2735

EUVD-2022-34977
A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
Affected Products (NVD)
VendorProductVersion
clusterlabspcs
0.10.5 ≤
𝑥
≤ 0.11.3
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pcs
bookworm
0.11.5-1+deb12u1
fixed
bullseye
0.10.8-1+deb11u1
fixed
bullseye (security)
0.10.8-1+deb11u1
fixed
buster
not-affected
sid
0.11.7-2
fixed
trixie
0.11.7-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pcs
bionic
not-affected
focal
not-affected
jammy
needed
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
dne
xenial
needs-triage