https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/errata/RHSA-2025:0288
Severity: Low
ID: 214070
File Name: redhat-RHSA-2025-0288.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 1/14/2025
Updated: 1/14/2025
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 5.5
Vendor Severity: Moderate
Risk Factor: High
Base Score: 7.3
Temporal Score: 5.7
Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:P/A:P
CVSS Score Source: CVE-2024-3661
Risk Factor: High
Base Score: 7.6
Temporal Score: 6.8
Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Risk Factor: Low
Base Score: 2.1
Threat Score: 1.2
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CPE: cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:networkmanager, p-cpe:/a:redhat:enterprise_linux:networkmanager-adsl, p-cpe:/a:redhat:enterprise_linux:networkmanager-bluetooth, p-cpe:/a:redhat:enterprise_linux:networkmanager-config-server, p-cpe:/a:redhat:enterprise_linux:networkmanager-libnm, p-cpe:/a:redhat:enterprise_linux:networkmanager-libnm-devel, p-cpe:/a:redhat:enterprise_linux:networkmanager-team, p-cpe:/a:redhat:enterprise_linux:networkmanager-tui, p-cpe:/a:redhat:enterprise_linux:networkmanager-wifi, p-cpe:/a:redhat:enterprise_linux:networkmanager-wwan, p-cpe:/a:redhat:enterprise_linux:networkmanager-dispatcher-routing-rules, p-cpe:/a:redhat:enterprise_linux:networkmanager-cloud-setup, p-cpe:/a:redhat:enterprise_linux:networkmanager-config-connectivity-redhat, p-cpe:/a:redhat:enterprise_linux:networkmanager-ovs, p-cpe:/a:redhat:enterprise_linux:networkmanager-ppp, p-cpe:/a:redhat:enterprise_linux:networkmanager-initscripts-updown, cpe:/o:redhat:rhel_eus:8.10
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 1/13/2025
Vulnerability Publication Date: 5/6/2024
CVE: CVE-2024-3661