Vulnerabilites related to gnome - control_center
Vulnerability from fkie_nvd
Published
2025-04-15 19:16
Modified
2025-08-26 16:34
Severity ?
Summary
In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.
References
▼ | URL | Tags | |
---|---|---|---|
security@ubuntu.com | https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/2039577 | Exploit, Issue Tracking | |
security@ubuntu.com | https://ubuntu.com/security/CVE-2023-5616 | Vendor Advisory | |
security@ubuntu.com | https://ubuntu.com/security/notices/USN-6554-1 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | control_center | * | |
gnome | control_center | * | |
gnome | control_center | * | |
gnome | control_center | * | |
canonical | ubuntu_linux | 20.04 | |
canonical | ubuntu_linux | 22.04 | |
canonical | ubuntu_linux | 23.04 | |
canonical | ubuntu_linux | 23.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "D445DCBB-103C-4744-9DE2-1FF15664C377", "versionEndExcluding": "1.3.36.5-0ubuntu4.1", "versionStartIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "D403A617-1667-4411-8FF5-C1CEA3F642A1", "versionEndExcluding": "1.41.7-0ubuntu0.22.04.8", "versionStartIncluding": "1.41", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BDC6FC6-2448-47F8-BD6E-B38E298B59DB", "versionEndExcluding": "1.44.0-1ubuntu6.1", "versionStartIncluding": "1.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:control_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED923FAF-6322-412B-B9C0-230E9B1A9A21", "versionEndExcluding": "1.45.0-1ubuntu3.1", "versionStartIncluding": "1.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*", "matchCriteriaId": "B2E702D7-F8C0-49BF-9FFB-883017076E98", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*", "matchCriteriaId": "602CE21C-E1A9-4407-A504-CF4E58F596F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user." }, { "lang": "es", "value": "En Ubuntu, gnome-control-center no reflejaba correctamente el estado de inicio de sesi\u00f3n remoto SSH cuando el sistema estaba configurado para usar la activaci\u00f3n del socket systemd para openssh-server. Esto pod\u00eda dejar, sin que el usuario lo supiera, la m\u00e1quina local expuesta al acceso remoto SSH, contrariamente a lo esperado." } ], "id": "CVE-2023-5616", "lastModified": "2025-08-26T16:34:27.843", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-04-15T19:16:06.647", "references": [ { "source": "security@ubuntu.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/2039577" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "https://ubuntu.com/security/CVE-2023-5616" }, { "source": "security@ubuntu.com", "tags": [ "Vendor Advisory" ], "url": "https://ubuntu.com/security/notices/USN-6554-1" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-08 23:15
Modified
2024-11-21 05:03
Severity ?
Summary
A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1873093 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1873093 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnome | control_center | - | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux_aus | 8.2 | |
redhat | enterprise_linux_eus | 8.2 | |
redhat | enterprise_linux_tus | 8.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:control_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4BC77D1-BB88-40FF-8326-D9C58AF8CF67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7883DE07-470D-4160-9767-4F831B75B9A8", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C24797C-0397-4D4F-ADC3-3B99095DBB35", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en el Centro de Control de GNOME en Red Hat Enterprise Linux versiones 8 anteriores a 8.2, donde usa inapropiadamente las credenciales Red Hat Customer Portal cuando un usuario registra un sistema mediante la Interfaz de Usuario de Configuraci\u00f3n de GNOME.\u0026#xa0;Este fallo permite a un atacante local detecte la contrase\u00f1a de Red Hat Customer Portal.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad" } ], "id": "CVE-2020-14391", "lastModified": "2024-11-21T05:03:09.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-08T23:15:11.660", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873093" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
CVE-2020-14391 (GCVE-0-2020-14391)
Vulnerability from cvelistv5
Published
2021-02-08 22:12
Modified
2024-08-04 12:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1873093 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | gnome-settings-daemon |
Version: Red Hat Enterprise Linux 8 versions prior to 8.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:46:34.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873093" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "gnome-settings-daemon", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Red Hat Enterprise Linux 8 versions prior to 8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-08T22:12:36", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873093" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14391", "datePublished": "2021-02-08T22:12:36", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:46:34.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-5616 (GCVE-0-2023-5616)
Vulnerability from cvelistv5
Published
2025-04-15 18:29
Modified
2025-04-15 20:51
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.
References
▼ | URL | Tags |
---|---|---|
https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/2039577 | issue-tracking | |
https://ubuntu.com/security/notices/USN-6554-1 | vendor-advisory | |
https://ubuntu.com/security/CVE-2023-5616 | issue-tracking |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Canonical Ltd. | Ubuntu's gnome-control-center |
Version: 1:45 Version: 1:44 Version: 1:41 Version: 1:3 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-5616", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-15T20:51:27.350779Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-15T20:51:31.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "packageName": "Ubuntu\u0027s gnome-control-center", "platforms": [ "Linux" ], "product": "Ubuntu\u0027s gnome-control-center", "repo": "https://git.launchpad.net/ubuntu/+source/gnome-remote-desktop", "vendor": "Canonical Ltd.", "versions": [ { "lessThan": "1:45.0-1ubuntu3.1", "status": "affected", "version": "1:45", "versionType": "deb" }, { "lessThan": "1:44.0-1ubuntu6.1", "status": "affected", "version": "1:44", "versionType": "deb" }, { "lessThan": "1:41.7-0ubuntu0.22.04.8", "status": "affected", "version": "1:41", "versionType": "deb" }, { "lessThan": "1:3.36.5-0ubuntu4.1", "status": "affected", "version": "1:3", "versionType": "deb" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Zygmunt Krynicki" } ], "descriptions": [ { "lang": "en", "value": "In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user." } ], "providerMetadata": { "dateUpdated": "2025-04-15T18:29:54.565Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/2039577" }, { "tags": [ "vendor-advisory" ], "url": "https://ubuntu.com/security/notices/USN-6554-1" }, { "tags": [ "issue-tracking" ], "url": "https://ubuntu.com/security/CVE-2023-5616" } ] } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2023-5616", "datePublished": "2025-04-15T18:29:54.565Z", "dateReserved": "2023-10-17T15:39:21.769Z", "dateUpdated": "2025-04-15T20:51:31.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }