CVE-2023-4886: Exposure of Sensitive Information to an Unauthorized Actor in Red Hat Red Hat Satellite 6.13 for RHEL 8
A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.
AI Analysis
Technical Summary
CVE-2023-4886 is a security vulnerability identified in Red Hat Satellite 6.13 running on Red Hat Enterprise Linux 8. The issue stems from the tomcat server.xml configuration file being world-readable, which inadvertently exposes passwords used for candlepin's keystore and truststore. Candlepin is a critical component responsible for subscription management and entitlement services within Red Hat Satellite, and its keystore and truststore contain sensitive cryptographic credentials essential for secure communications and authentication. Because the server.xml file is accessible by any user on the system, an unauthorized local actor with some level of elevated privileges (PR:H) can read these passwords without requiring user interaction. This exposure can lead to compromise of the keystore and truststore, enabling attackers to impersonate services, decrypt sensitive data, or manipulate subscription management processes. The vulnerability has a CVSS v3.1 score of 6.7, classified as medium severity, reflecting the requirement for local privileged access but the high impact on confidentiality, integrity, and availability if exploited. No public exploits have been reported yet, but the risk remains significant due to the sensitive nature of the exposed credentials. The root cause is improper file permission settings on the tomcat server.xml file, which should be restricted to only necessary system users. This vulnerability highlights the importance of secure configuration management and least privilege principles in critical infrastructure components like Red Hat Satellite.
Potential Impact
For European organizations, especially those relying on Red Hat Satellite for managing their Linux infrastructure and subscriptions, this vulnerability poses a significant risk. Exposure of candlepin keystore and truststore passwords can lead to unauthorized access to subscription management services, potentially allowing attackers to manipulate license entitlements or disrupt service availability. Furthermore, compromise of these credentials could facilitate lateral movement within the network, privilege escalation, or interception of sensitive communications. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory consequences if sensitive data is compromised. The requirement for local privileged access somewhat limits the attack surface; however, insider threats or attackers who have already gained partial access could exploit this vulnerability to deepen their foothold. The medium severity rating suggests that while immediate remote exploitation is unlikely, the potential damage to confidentiality, integrity, and availability is substantial if exploited. This could result in operational disruptions, loss of trust, and increased remediation costs.
Mitigation Recommendations
To mitigate CVE-2023-4886, organizations should immediately audit the file permissions of the tomcat server.xml file on all Red Hat Satellite 6.13 installations running on RHEL 8. The file permissions must be restricted to only the tomcat service user and system administrators, removing world-readable access. Implement strict access control policies and regularly review user privileges to ensure that only trusted personnel have elevated access. Monitor system logs for unusual access patterns to the server.xml file or candlepin services. Apply any patches or updates released by Red Hat addressing this vulnerability as soon as they become available. Additionally, consider isolating Red Hat Satellite servers in segmented network zones with limited access to reduce the risk of unauthorized local access. Employ host-based intrusion detection systems (HIDS) to detect unauthorized file access attempts. Finally, conduct security awareness training for administrators to emphasize the importance of secure file permissions and configuration management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2023-4886: Exposure of Sensitive Information to an Unauthorized Actor in Red Hat Red Hat Satellite 6.13 for RHEL 8
Description
A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.
AI-Powered Analysis
Technical Analysis
CVE-2023-4886 is a security vulnerability identified in Red Hat Satellite 6.13 running on Red Hat Enterprise Linux 8. The issue stems from the tomcat server.xml configuration file being world-readable, which inadvertently exposes passwords used for candlepin's keystore and truststore. Candlepin is a critical component responsible for subscription management and entitlement services within Red Hat Satellite, and its keystore and truststore contain sensitive cryptographic credentials essential for secure communications and authentication. Because the server.xml file is accessible by any user on the system, an unauthorized local actor with some level of elevated privileges (PR:H) can read these passwords without requiring user interaction. This exposure can lead to compromise of the keystore and truststore, enabling attackers to impersonate services, decrypt sensitive data, or manipulate subscription management processes. The vulnerability has a CVSS v3.1 score of 6.7, classified as medium severity, reflecting the requirement for local privileged access but the high impact on confidentiality, integrity, and availability if exploited. No public exploits have been reported yet, but the risk remains significant due to the sensitive nature of the exposed credentials. The root cause is improper file permission settings on the tomcat server.xml file, which should be restricted to only necessary system users. This vulnerability highlights the importance of secure configuration management and least privilege principles in critical infrastructure components like Red Hat Satellite.
Potential Impact
For European organizations, especially those relying on Red Hat Satellite for managing their Linux infrastructure and subscriptions, this vulnerability poses a significant risk. Exposure of candlepin keystore and truststore passwords can lead to unauthorized access to subscription management services, potentially allowing attackers to manipulate license entitlements or disrupt service availability. Furthermore, compromise of these credentials could facilitate lateral movement within the network, privilege escalation, or interception of sensitive communications. Organizations in sectors with strict compliance requirements, such as finance, healthcare, and government, may face regulatory consequences if sensitive data is compromised. The requirement for local privileged access somewhat limits the attack surface; however, insider threats or attackers who have already gained partial access could exploit this vulnerability to deepen their foothold. The medium severity rating suggests that while immediate remote exploitation is unlikely, the potential damage to confidentiality, integrity, and availability is substantial if exploited. This could result in operational disruptions, loss of trust, and increased remediation costs.
Mitigation Recommendations
To mitigate CVE-2023-4886, organizations should immediately audit the file permissions of the tomcat server.xml file on all Red Hat Satellite 6.13 installations running on RHEL 8. The file permissions must be restricted to only the tomcat service user and system administrators, removing world-readable access. Implement strict access control policies and regularly review user privileges to ensure that only trusted personnel have elevated access. Monitor system logs for unusual access patterns to the server.xml file or candlepin services. Apply any patches or updates released by Red Hat addressing this vulnerability as soon as they become available. Additionally, consider isolating Red Hat Satellite servers in segmented network zones with limited access to reduce the risk of unauthorized local access. Employ host-based intrusion detection systems (HIDS) to detect unauthorized file access attempts. Finally, conduct security awareness training for administrators to emphasize the importance of secure file permissions and configuration management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2023-09-11T09:51:13.928Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e84aedba0e608b4fb043a0
Added to database: 10/9/2025, 11:53:17 PM
Last enriched: 10/10/2025, 12:10:20 AM
Last updated: 10/16/2025, 12:42:29 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.