ID CVE-2017-7537
Summary It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.16:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.16:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.5.17:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.5.17:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:beta:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:rc:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.0:rc:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dogtagpki:dogtagpki:10.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:dogtagpki:dogtagpki:10.6.3:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-10-2019 - 23:29)
Impact:
Exploitability:
CWE CWE-798
CAPEC
  • Try Common or Default Usernames and Passwords
    An adversary may try certain common or default usernames and passwords to gain access into the system and perform unauthorized actions. An adversary may try an intelligent brute force using empty passwords, known vendor default credentials, as well as a dictionary of common usernames and passwords. Many vendor products come preconfigured with default (and thus well-known) usernames and passwords that should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials. Another problem is that users would pick very simple (common) passwords (e.g. "secret" or "password") that make it easier for the attacker to gain access to the system compared to using a brute force attack or even a dictionary attack using a full dictionary.
  • Read Sensitive Strings Within an Executable
    An adversary engages in activities to discover any sensitive strings are present within the compiled code of an executable, such as literal ASCII strings within the file itself, or possibly strings hard-coded into particular routines that can be revealed by code refactoring methods including static and dynamic analysis. One specific example of a sensitive string is a hard-coded password. Typical examples of software with hard-coded passwords include server-side executables which may check for a hard-coded password or key during a user's authentication with the server. Hard-coded passwords can also be present in client-side executables which utilize the password or key when connecting to either a remote component, such as a database server, licensing server, or otherwise, or a processes on the same host that expects a key or password. When analyzing an executable the adversary may search for the presence of such strings by analyzing the byte-code of the file itself. Example utilities for revealing strings within a file include 'strings,' 'grep,' or other variants of these programs depending upon the type of operating system used. These programs can be used to dump any ASCII or UNICODE strings contained within a program. Strings can also be searched for using a hex editors by loading the binary or object code file and utilizing native search functions such as regular expressions.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
redhat via4
advisories
bugzilla
id 1470817
title CVE-2017-7537 pki-core: mock CMC authentication plugin with hardcoded secret enabled by default
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 7 is installed
      oval oval:com.redhat.rhba:tst:20150364027
    • OR
      • AND
        • comment pki-base is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335001
        • comment pki-base is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20172335002
      • AND
        • comment pki-base-java is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335003
        • comment pki-base-java is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20172335004
      • AND
        • comment pki-ca is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335005
        • comment pki-ca is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130511002
      • AND
        • comment pki-javadoc is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335007
        • comment pki-javadoc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20172335008
      • AND
        • comment pki-kra is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335009
        • comment pki-kra is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20172335010
      • AND
        • comment pki-server is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335011
        • comment pki-server is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20172335012
      • AND
        • comment pki-symkey is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335013
        • comment pki-symkey is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130511020
      • AND
        • comment pki-tools is earlier than 0:10.4.1-11.el7
          oval oval:com.redhat.rhsa:tst:20172335015
        • comment pki-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20172335016
rhsa
id RHSA-2017:2335
released 2017-08-01
severity Moderate
title RHSA-2017:2335: pki-core security update (Moderate)
rpms
  • pki-base-0:10.4.1-11.el7
  • pki-base-java-0:10.4.1-11.el7
  • pki-ca-0:10.4.1-11.el7
  • pki-core-debuginfo-0:10.4.1-11.el7
  • pki-javadoc-0:10.4.1-11.el7
  • pki-kra-0:10.4.1-11.el7
  • pki-server-0:10.4.1-11.el7
  • pki-symkey-0:10.4.1-11.el7
  • pki-tools-0:10.4.1-11.el7
refmap via4
confirm
Last major update 09-10-2019 - 23:29
Published 26-07-2018 - 13:29
Last modified 09-10-2019 - 23:29
Back to Top