CVE-2019-3843

HIGH

Systemd < 242 - Improper Privilege Management

Title source: rule

Description

It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.

Exploits (1)

exploitdb WORKING POC
doslinux
https://www.exploit-db.com/exploits/46760

Scores

CVSS v3 7.8
EPSS 0.0012
EPSS Percentile 30.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-269 CWE-266
Status published
Products (9)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 19.10
fedoraproject/fedora 30
netapp/cn1610_firmware
netapp/hci_management_node
netapp/snapprotect
netapp/solidfire
systemd_project/systemd < 242
Published Apr 26, 2019
Tracked Since Feb 18, 2026