Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2022-21672
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-10 Jan, 2022 | 21:15
Updated At-24 Jan, 2022 | 19:40

make-ca is a utility to deliver and manage a complete PKI configuration for workstations and servers. Starting with version 0.9 and prior to version 1.10, make-ca misinterprets Mozilla certdata.txt and treats explicitly untrusted certificates like trusted ones, causing those explicitly untrusted certificates trusted by the system. The explicitly untrusted certificates were used by some CAs already hacked. Hostile attackers may perform a MIM attack exploiting them. Everyone using the affected versions of make-ca should upgrade to make-ca-1.10, and run `make-ca -f -g` as the `root` user to regenerate the trusted store immediately. As a workaround, users may delete the untrusted certificates from /etc/pki/tls and /etc/ssl/certs manually (or by a script), but this is not recommended because the manual changes will be overwritten next time running make-ca to update the trusted anchor.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

linuxfromscratch
linuxfromscratch
>>make-ca>>Versions from 0.9(inclusive) to 1.10(exclusive)
cpe:2.3:a:linuxfromscratch:make-ca:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-115Secondarysecurity-advisories@github.com
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-115
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/lfs-book/make-ca/issues/19security-advisories@github.com
Issue Tracking
Mitigation
Third Party Advisory
https://github.com/lfs-book/make-ca/pull/20security-advisories@github.com
Patch
Third Party Advisory
https://github.com/lfs-book/make-ca/security/advisories/GHSA-m5qh-728v-4xrxsecurity-advisories@github.com
Patch
Third Party Advisory
https://lists.linuxfromscratch.org/sympa/arc/blfs-support/2022-01/msg00020.htmlsecurity-advisories@github.com
Mailing List
Mitigation
Vendor Advisory
Hyperlink: https://github.com/lfs-book/make-ca/issues/19
Source: security-advisories@github.com
Resource:
Issue Tracking
Mitigation
Third Party Advisory
Hyperlink: https://github.com/lfs-book/make-ca/pull/20
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://github.com/lfs-book/make-ca/security/advisories/GHSA-m5qh-728v-4xrx
Source: security-advisories@github.com
Resource:
Patch
Third Party Advisory
Hyperlink: https://lists.linuxfromscratch.org/sympa/arc/blfs-support/2022-01/msg00020.html
Source: security-advisories@github.com
Resource:
Mailing List
Mitigation
Vendor Advisory
Change History
0Changes found

Details not found