CVE-2018-20839

Severity
4.3MEDIUM
EPSS
0.7%
top 29.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 17
Latest updateMay 24

Description

systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 0.7 | Impact: 3.6

Affected Packages2 packages

Debianplymouth< 0.9.4-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5cwj-wmj7-j224: systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdo2022-05-24
OSV
CVE-2018-20839: systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdo2019-05-17
CVEList
CVE-2018-20839: systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdo2019-05-17

📋Vendor Advisories

2
Red Hat
systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker2019-05-17
Debian
CVE-2018-20839: plymouth - systemd 242 changes the VT1 mode upon a logout, which allows attackers to read c...2018

💬Community

2
Bugzilla
CVE-2018-20839 systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker [fedora-all]2019-06-04
Bugzilla
CVE-2018-20839 systemd: mishandling of the current keyboard mode check leading to passwords being disclosed in cleartext to attacker2019-06-04