CVE-2020-10699

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

References

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699

https://github.com/open-iscsi/targetcli-fb/issues/162

https://security.gentoo.org/glsa/202008-22

Details

Source: MITRE

Published: 2020-04-15

Updated: 2020-08-30

Type: CWE-269

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

Tenable Plugins

View all (4 total)

IDNameProductFamilySeverity
145856CentOS 8 : targetcli (CESA-2020:1933)NessusCentOS Local Security Checks
high
140070GLSA-202008-22 : targetcli-fb: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
136445Oracle Linux 8 : targetcli (ELSA-2020-1933)NessusOracle Linux Local Security Checks
high
136065RHEL 8 : targetcli (RHSA-2020:1933)NessusRed Hat Local Security Checks
high