// For flags

CVE-2021-25321

arpwatch: Local privilege escalation from runtime user to root

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.

Una vulnerabilidad de Seguimiento de Enlaces Simbólicos UNIX (Symlink) en arpwatch de SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server versión 4.0, SUSE OpenStack Cloud Crowbar versión 9; openSUSE Factory, Leap versión 15.2, permite a atacantes locales con control del usuario en runtime ejecutar arpwatch como escalar a root en el siguiente reinicio de arpwatch. Este problema afecta a: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versiones anteriores a 2.1a15. SUSE Manager Server 4.0 arpwatch versiones anteriores a 2.1a15. SUSE OpenStack Cloud Crowbar 9 versiones arpwatch anteriores a 2.1a15. openSUSE Factory versión arpwatch 2.1a15-169.5 y versiones anteriores. openSUSE Leap 15.2 versión arpwatch 2.1a15-lp152.5.5 y versiones anteriores

*Credits: Johannes Segitz of SUSE
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-19 CVE Reserved
  • 2021-06-30 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • 2024-09-16 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-61: UNIX Symbolic Link (Symlink) Following
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Suse
Search vendor "Suse"
Arpwatch
Search vendor "Suse" for product "Arpwatch"
< 2.1a15
Search vendor "Suse" for product "Arpwatch" and version " < 2.1a15"
-
Affected
in Suse
Search vendor "Suse"
Manager Server
Search vendor "Suse" for product "Manager Server"
4.0
Search vendor "Suse" for product "Manager Server" and version "4.0"
-
Safe
Suse
Search vendor "Suse"
Arpwatch
Search vendor "Suse" for product "Arpwatch"
< 2.1a15
Search vendor "Suse" for product "Arpwatch" and version " < 2.1a15"
-
Affected
in Suse
Search vendor "Suse"
Openstack Cloud Crowbar
Search vendor "Suse" for product "Openstack Cloud Crowbar"
9.0
Search vendor "Suse" for product "Openstack Cloud Crowbar" and version "9.0"
-
Safe
Suse
Search vendor "Suse"
Arpwatch
Search vendor "Suse" for product "Arpwatch"
< 2.1a15
Search vendor "Suse" for product "Arpwatch" and version " < 2.1a15"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
sp4, ltss
Safe
Suse
Search vendor "Suse"
Arpwatch
Search vendor "Suse" for product "Arpwatch"
<= 2.1a15-169.5
Search vendor "Suse" for product "Arpwatch" and version " <= 2.1a15-169.5"
-
Affected
in Opensuse
Search vendor "Opensuse"
Factory
Search vendor "Opensuse" for product "Factory"
--
Safe
Suse
Search vendor "Suse"
Arpwatch
Search vendor "Suse" for product "Arpwatch"
<= 2.1a15-lp152.5.5
Search vendor "Suse" for product "Arpwatch" and version " <= 2.1a15-lp152.5.5"
-
Affected
in Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.2
Search vendor "Opensuse" for product "Leap" and version "15.2"
-
Safe