Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-22037 |
CWE-ID | CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
SUSE Manager Server Extension Operating systems & Components / Operating system SUSE Manager Retail Branch Server Extension Operating systems & Components / Operating system SUSE Manager Proxy Extension Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system mgradm-lang Operating systems & Components / Operating system package or component mgrctl-zsh-completion Operating systems & Components / Operating system package or component mgradm-bash-completion Operating systems & Components / Operating system package or component mgradm-zsh-completion Operating systems & Components / Operating system package or component mgrctl-bash-completion Operating systems & Components / Operating system package or component mgrctl-lang Operating systems & Components / Operating system package or component mgrctl-debuginfo Operating systems & Components / Operating system package or component mgrctl Operating systems & Components / Operating system package or component uyuni-storage-setup-server Operating systems & Components / Operating system package or component mgradm Operating systems & Components / Operating system package or component mgradm-debuginfo Operating systems & Components / Operating system package or component mgrpxy-zsh-completion Operating systems & Components / Operating system package or component mgrpxy-bash-completion Operating systems & Components / Operating system package or component mgrpxy-lang Operating systems & Components / Operating system package or component uyuni-storage-setup-proxy Operating systems & Components / Operating system package or component mgrpxy-debuginfo Operating systems & Components / Operating system package or component mgrpxy Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104016
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-22037
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to the uyuni-server-attestation systemd service uses the database_password environment variable to store password. A local user can obtain the password via systemd.
MitigationUpdate the affected package Maintenance update for SUSE Manager 5.0: Server, Proxy and Retail Branch Server to the latest version.
Vulnerable software versionsSUSE Manager Server Extension: 5.0
SUSE Manager Retail Branch Server Extension: 5.0
SUSE Manager Proxy Extension: 5.0
SUSE Linux Enterprise Micro: 5.5
mgradm-lang: before 0.1.26-150500.3.12.2
mgrctl-zsh-completion: before 0.1.26-150500.3.12.2
mgradm-bash-completion: before 0.1.26-150500.3.12.2
mgradm-zsh-completion: before 0.1.26-150500.3.12.2
mgrctl-bash-completion: before 0.1.26-150500.3.12.2
mgrctl-lang: before 0.1.26-150500.3.12.2
mgrctl-debuginfo: before 0.1.26-150500.3.12.2
mgrctl: before 0.1.26-150500.3.12.2
uyuni-storage-setup-server: before 5.0.3-150500.12.6.4
mgradm: before 0.1.26-150500.3.12.2
mgradm-debuginfo: before 0.1.26-150500.3.12.2
mgrpxy-zsh-completion: before 0.1.26-150500.3.12.2
mgrpxy-bash-completion: before 0.1.26-150500.3.12.2
mgrpxy-lang: before 0.1.26-150500.3.12.2
uyuni-storage-setup-proxy: before 5.0.3-150500.12.6.4
mgrpxy-debuginfo: before 0.1.26-150500.3.12.2
mgrpxy: before 0.1.26-150500.3.12.2
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-ru-20244008-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.