Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-28436
Modified
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-23 Mar, 2023 | 20:15
Updated At-07 Nov, 2023 | 04:10

Tailscale is software for using Wireguard and multi-factor authentication (MFA). A vulnerability identified in the implementation of Tailscale SSH starting in version 1.34.0 and prior to prior to 1.38.2 in FreeBSD allows commands to be run with a higher privilege group ID than that specified in Tailscale SSH access rules. A difference in the behavior of the FreeBSD `setgroups` system call from POSIX meant that the Tailscale client running on a FreeBSD-based operating system did not appropriately restrict groups on the host when using Tailscale SSH. When accessing a FreeBSD host over Tailscale SSH, the egid of the tailscaled process was used instead of that of the user specified in Tailscale SSH access rules. Tailscale SSH commands may have been run with a higher privilege group ID than that specified in Tailscale SSH access rules if they met all of the following criteria: the destination node was a FreeBSD device with Tailscale SSH enabled; Tailscale SSH access rules permitted access for non-root users; and a non-interactive SSH session was used. Affected users should upgrade to version 1.38.2 to remediate the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.0HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.15.7MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 5.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N
CPE Matches

tailscale
tailscale
>>tailscale>>Versions from 1.34(inclusive) to 1.38.2(exclusive)
cpe:2.3:a:tailscale:tailscale:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-269Primarysecurity-advisories@github.com
CWE ID: CWE-269
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/tailscale/tailscale/commit/d00c046b723dff6e3775d7d35f891403ac21a47dsecurity-advisories@github.com
Patch
https://github.com/tailscale/tailscale/releases/tag/v1.38.2security-advisories@github.com
Patch
Release Notes
https://github.com/tailscale/tailscale/security/advisories/GHSA-vfgq-g5x8-g595security-advisories@github.com
Mitigation
Vendor Advisory
https://tailscale.com/security-bulletins/#ts-2023-003security-advisories@github.com
Vendor Advisory
Hyperlink: https://github.com/tailscale/tailscale/commit/d00c046b723dff6e3775d7d35f891403ac21a47d
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/tailscale/tailscale/releases/tag/v1.38.2
Source: security-advisories@github.com
Resource:
Patch
Release Notes
Hyperlink: https://github.com/tailscale/tailscale/security/advisories/GHSA-vfgq-g5x8-g595
Source: security-advisories@github.com
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://tailscale.com/security-bulletins/#ts-2023-003
Source: security-advisories@github.com
Resource:
Vendor Advisory
Change History
0Changes found

Details not found