Search for vulnerabilities
Vulnerability details: VCID-x5t6-c9gf-aaas
Vulnerability ID VCID-x5t6-c9gf-aaas
Aliases CVE-2023-7090
Summary A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7090.json
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00033 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00034 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00049 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00118 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.00329 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
epss 0.01046 https://api.first.org/data/v1/epss?cve=CVE-2023-7090
cvssv3.1 7.7 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-7090
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-7090
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7090.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-7090
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-7090
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.08275
EPSS Score 0.00033
Published At April 21, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2024-01-03T17:14:57.830714+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2023-7090 34.0.0rc1