Skip to main content

CVE-2022-4415: CWE-200 in systemd

Medium
VulnerabilityCVE-2022-4415cvecve-2022-4415cwe-200
Published: Wed Jan 11 2023 (01/11/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: systemd

Description

A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:12:48 UTC

Technical Analysis

CVE-2022-4415 is a medium-severity local information disclosure vulnerability found in systemd versions 247 and later. Systemd is a widely used system and service manager for Linux operating systems, responsible for initializing system components and managing system processes. The vulnerability arises because systemd-coredump, a component responsible for handling core dumps (memory snapshots of crashed processes), does not respect the Linux kernel's fs.suid_dumpable setting. This kernel setting controls whether core dumps are generated for set-user-ID (setuid) programs, which often run with elevated privileges. When fs.suid_dumpable is disabled or set to restrict core dumps, systemd-coredump should honor this and avoid creating core dumps that could leak sensitive information. However, due to this flaw, systemd-coredump may still generate core dumps for privileged processes, potentially exposing sensitive data contained in memory to local users with limited privileges. The vulnerability requires local access and low privileges (PR:L) but no user interaction (UI:N). Exploitation does not affect system integrity or availability but can lead to a high impact on confidentiality by leaking sensitive information from privileged processes. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the moderate risk posed by this vulnerability. There are no known exploits in the wild as of the published date, and no official patches are linked in the provided data, though systemd maintainers and Linux distributors typically address such issues promptly. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Potential Impact

For European organizations, the primary impact of CVE-2022-4415 is the potential exposure of sensitive information from privileged processes on Linux systems running systemd version 247 or later. This could include credentials, cryptographic keys, or other confidential data residing in memory at the time of a crash. While the vulnerability requires local access, it raises concerns in multi-user environments such as shared servers, cloud infrastructure, or development environments where unprivileged users coexist with privileged services. Data leakage could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations handling sensitive or regulated data (e.g., financial institutions, healthcare providers, government agencies) may face compliance risks if confidential information is inadvertently exposed. The vulnerability does not directly impact system availability or integrity but can undermine trust in system security and confidentiality. Given the widespread use of systemd across Linux distributions common in European enterprises and public sector infrastructure, the exposure risk is non-negligible, especially in environments with multiple user roles or where attackers may gain limited local access through other means.

Mitigation Recommendations

To mitigate CVE-2022-4415, European organizations should: 1) Identify and inventory all Linux systems running systemd version 247 or later. 2) Apply vendor-provided patches or updates for systemd as soon as they become available, as Linux distributions typically release fixes promptly after vulnerability disclosure. 3) Until patches are applied, consider restricting local user access to systems running vulnerable systemd versions, minimizing the risk of unauthorized local information disclosure. 4) Review and enforce strict access controls and user permissions to limit unprivileged users' ability to trigger core dumps or access core dump files. 5) Monitor system logs and audit core dump generation activities to detect unusual or unauthorized core dump events. 6) Evaluate the fs.suid_dumpable kernel setting and related security configurations to ensure they align with organizational security policies, although this vulnerability bypasses that setting, it remains a best practice to keep it restrictive. 7) Consider deploying additional endpoint security controls that detect or prevent unauthorized local access or privilege escalation attempts. 8) Educate system administrators and security teams about this vulnerability to ensure rapid response and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-12-12T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc394

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:12:48 AM

Last updated: 8/7/2025, 12:35:00 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats