Skip to main content

CVE-2022-3287: CWE-256 | CWE-552 in fwupd

Medium
VulnerabilityCVE-2022-3287cvecve-2022-3287cwe-256
Published: Wed Sep 28 2022 (09/28/2022, 19:07:38 UTC)
Source: CVE
Vendor/Project: n/a
Product: fwupd

Description

When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.

AI-Powered Analysis

AILast updated: 07/06/2025, 06:26:58 UTC

Technical Analysis

CVE-2022-3287 is a medium-severity vulnerability affecting the fwupd software, specifically related to its Redfish plugin. fwupd is a Linux daemon used for managing firmware updates on various hardware devices. The vulnerability arises when an OPERATOR user account is created on the Baseboard Management Controller (BMC). During this process, the Redfish plugin auto-generates a password for the OPERATOR account and saves it in the configuration file located at /etc/fwupd/redfish.conf. However, this file is not properly permission-restricted, allowing any local user on the system to read the file and thus obtain the OPERATOR account password. This vulnerability is categorized under CWE-256 (Plaintext Storage of a Password) and CWE-552 (Files or Directories Accessible to External Parties). The CVSS 3.1 score is 6.5, indicating a medium severity level, with the vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. This means the vulnerability can be exploited remotely over the network with low attack complexity, requires low privileges (a user with some access), no user interaction, and impacts confidentiality with high impact but no impact on integrity or availability. The vulnerability was fixed in fwupd version 1.8.5. No known exploits are reported in the wild. The core issue is the insecure storage of sensitive credentials in a world-readable configuration file, which could allow unauthorized local users to escalate privileges or access management functions on the BMC via the compromised OPERATOR account credentials.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where fwupd is deployed on servers or critical infrastructure systems that utilize BMCs for remote management. Unauthorized access to the OPERATOR account credentials could allow attackers or malicious insiders to gain elevated access to hardware management interfaces, potentially leading to unauthorized firmware updates, hardware configuration changes, or persistent backdoors at the firmware level. This could compromise the confidentiality of sensitive system management operations and potentially lead to further lateral movement within the network. Given that many European enterprises and data centers rely on Linux-based systems and BMCs for server management, the exposure of these credentials could undermine the security of critical infrastructure and enterprise IT environments. The vulnerability does not directly impact system integrity or availability but the confidentiality breach could facilitate more severe attacks if combined with other vulnerabilities or insider threats.

Mitigation Recommendations

European organizations should ensure that fwupd is updated to version 1.8.5 or later where this vulnerability is patched. In addition, organizations should audit the permissions of the /etc/fwupd/redfish.conf file and restrict access strictly to privileged users only (e.g., root or fwupd service accounts). Implementing file system access controls such as SELinux or AppArmor policies to enforce strict read permissions on sensitive configuration files is recommended. Organizations should also monitor for any unauthorized access attempts to BMC interfaces and review logs for suspicious activity related to OPERATOR account usage. Where possible, disable or limit the creation of OPERATOR accounts unless absolutely necessary. Employ network segmentation to restrict access to BMC management interfaces to trusted administrative hosts only. Finally, conduct regular security assessments and penetration tests focusing on firmware management and BMC security to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-09-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ce4114d7c5ea9f4b39351

Added to database: 5/20/2025, 8:20:33 PM

Last enriched: 7/6/2025, 6:26:58 AM

Last updated: 7/29/2025, 2:13:10 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats