Learn about CVE-2020-8028, a critical vulnerability in SUSE Manager Server allowing local users to escalate privileges. Find mitigation steps and patching details here.
A Improper Access Control vulnerability in the configuration of salt of SUSE Linux Enterprise Module for SUSE Manager Server 4.1, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Manager Server 3.2, SUSE Manager Server 4.0 allows local users to escalate to root on every system managed by SUSE manager. This issue affects various versions of different products.
Understanding CVE-2020-8028
This CVE involves an Improper Access Control vulnerability in the salt configuration of multiple SUSE products, potentially leading to privilege escalation.
What is CVE-2020-8028?
CVE-2020-8028 is a critical vulnerability that allows local users to escalate privileges to root on systems managed by SUSE Manager due to improper access control in the salt configuration.
The Impact of CVE-2020-8028
The vulnerability has a CVSS base score of 9.3, indicating a critical severity level. The impact includes high confidentiality, integrity, and availability impacts, with no privileges required for exploitation.
Technical Details of CVE-2020-8028
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability in the salt configuration of SUSE products allows local users to escalate privileges to root on managed systems, posing a significant security risk.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited locally, with no user interaction required, and can result in the execution of arbitrary code as the salt user, potentially leading to root access.
Mitigation and Prevention
To address CVE-2020-8028, follow these mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates