CVE Vulnerabilities

CVE-2008-5082

Improper Authentication

Published: Jan 30, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The verifyProof function in the Token Processing System (TPS) component in Red Hat Certificate System (RHCS) 7.1 through 7.3 and Dogtag Certificate System 1.0 returns successfully even when token enrollment did not use the hardware key, which allows remote authenticated users with enrollment privileges to bypass intended authentication policies by performing enrollment with a software key.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
_dogtag_certificate_systemRedhat1.0 (including)1.0 (including)
Certificate_systemRedhat7.1 (including)7.1 (including)
Certificate_systemRedhat7.2 (including)7.2 (including)
Certificate_systemRedhat7.3 (including)7.3 (including)
Red Hat Certificate System 7.3RedHatpkisetup-0:7.3.0-14.el4*
Red Hat Certificate System 7.3RedHatrhpki-ca-0:7.3.0-17.el4*
Red Hat Certificate System 7.3RedHatrhpki-common-0:7.3.0-40.el4*
Red Hat Certificate System 7.3RedHatrhpki-kra-0:7.3.0-13.el4*
Red Hat Certificate System 7.3RedHatrhpki-ocsp-0:7.3.0-11.el4*
Red Hat Certificate System 7.3RedHatrhpki-ra-0:7.3.0-67.el4*
Red Hat Certificate System 7.3RedHatrhpki-tks-0:7.3.0-12.el4*
Red Hat Certificate System 7.3RedHatrhpki-tps-0:7.3.0-23.el4*
Red Hat Certificate System 7.3RedHatrhpki-util-0:7.3.0-20.el4*

Potential Mitigations

References