Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-27777


A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.


Published

2020-12-15T17:15:14.333

Last Modified

2024-11-21T05:21:48.973

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-862

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 4.14.204 Yes
Operating System linux linux_kernel < 4.19.155 Yes
Operating System linux linux_kernel < 5.4.75 Yes
Operating System linux linux_kernel < 5.9.5 Yes
Application redhat openshift_container_platform 4.4 Yes
Application redhat openshift_container_platform 4.5 Yes
Application redhat openshift_container_platform 4.6 Yes
Operating System redhat enterprise_linux 5.0 Yes
Operating System redhat enterprise_linux 6.0 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_linux 8.0 Yes

References