systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the "systemctl status" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.
History

Fri, 07 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-03-03T00:00:00.000Z

Updated: 2025-03-07T18:16:47.782Z

Reserved: 2023-02-26T00:00:00.000Z

Link: CVE-2023-26604

cve-icon Vulnrichment

Updated: 2024-08-02T11:53:53.661Z

cve-icon NVD

Status : Modified

Published: 2023-03-03T16:15:10.607

Modified: 2025-03-07T19:15:34.837

Link: CVE-2023-26604

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-03T00:00:00Z

Links: CVE-2023-26604 - Bugzilla