Description
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
References (3)
Core 3
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202008-22
Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699
Third Party Advisory
https://github.com/open-iscsi/targetcli-fb/issues/162
Scores
CVSS v3
7.8
EPSS
0.0014
EPSS Percentile
33.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-732
Status
published
Products (2)
targetcli-fb_project/targetcli-fb
2.1.50
targetcli-fb_project/targetcli-fb
2.1.51
Published
Apr 15, 2020
Tracked Since
Feb 18, 2026