CVE-2021-25321
arpwatch: Local privilege escalation from runtime user to root
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
Una vulnerabilidad de Seguimiento de Enlaces Simbólicos UNIX (Symlink) en arpwatch de SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server versión 4.0, SUSE OpenStack Cloud Crowbar versión 9; openSUSE Factory, Leap versión 15.2, permite a atacantes locales con control del usuario en runtime ejecutar arpwatch como escalar a root en el siguiente reinicio de arpwatch. Este problema afecta a: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versiones anteriores a 2.1a15. SUSE Manager Server 4.0 arpwatch versiones anteriores a 2.1a15. SUSE OpenStack Cloud Crowbar 9 versiones arpwatch anteriores a 2.1a15. openSUSE Factory versión arpwatch 2.1a15-169.5 y versiones anteriores. openSUSE Leap 15.2 versión arpwatch 2.1a15-lp152.5.5 y versiones anteriores
An update that fixes one vulnerability is now available. This update for arpwatch fixes the following issues. Fixed local privilege escalation from runtime user to root. This update was imported from the SUSE:SLE-15:Update update project.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-19 CVE Reserved
- 2021-06-30 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-61: UNIX Symbolic Link (Symlink) Following
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1186240 | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Suse Search vendor "Suse" | Arpwatch Search vendor "Suse" for product "Arpwatch" | < 2.1a15 Search vendor "Suse" for product "Arpwatch" and version " < 2.1a15" | - |
Affected
| in | Suse Search vendor "Suse" | Manager Server Search vendor "Suse" for product "Manager Server" | 4.0 Search vendor "Suse" for product "Manager Server" and version "4.0" | - |
Safe
|
Suse Search vendor "Suse" | Arpwatch Search vendor "Suse" for product "Arpwatch" | < 2.1a15 Search vendor "Suse" for product "Arpwatch" and version " < 2.1a15" | - |
Affected
| in | Suse Search vendor "Suse" | Openstack Cloud Crowbar Search vendor "Suse" for product "Openstack Cloud Crowbar" | 9.0 Search vendor "Suse" for product "Openstack Cloud Crowbar" and version "9.0" | - |
Safe
|
Suse Search vendor "Suse" | Arpwatch Search vendor "Suse" for product "Arpwatch" | < 2.1a15 Search vendor "Suse" for product "Arpwatch" and version " < 2.1a15" | - |
Affected
| in | Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 11 Search vendor "Suse" for product "Linux Enterprise Server" and version "11" | sp4, ltss |
Safe
|
Suse Search vendor "Suse" | Arpwatch Search vendor "Suse" for product "Arpwatch" | <= 2.1a15-169.5 Search vendor "Suse" for product "Arpwatch" and version " <= 2.1a15-169.5" | - |
Affected
| in | Opensuse Search vendor "Opensuse" | Factory Search vendor "Opensuse" for product "Factory" | - | - |
Safe
|
Suse Search vendor "Suse" | Arpwatch Search vendor "Suse" for product "Arpwatch" | <= 2.1a15-lp152.5.5 Search vendor "Suse" for product "Arpwatch" and version " <= 2.1a15-lp152.5.5" | - |
Affected
| in | Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.2 Search vendor "Opensuse" for product "Leap" and version "15.2" | - |
Safe
|