nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems.
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.00966Percentile:
0.75607
CVSS Scoring
CVSS v2 Score: 5.0
Severity:
Mapped CWE(s)
CWE-862
: Missing Authorization
All CAPEC(s)
CAPEC-665 : Exploitation of Thunderbolt Protection Flaws
CAPEC(s) with Mapped TTPs
CAPEC-665 : Exploitation of Thunderbolt Protection Flaws
Mapped TTPs:
T1211
: Exploitation for Defense Evasion
T1542.002
: Component Firmware
T1556
: Modify Authentication Process
Mapped ATT&CK TTPs
T1211
: Exploitation for Defense Evasion
Kill Chain: defense-evasion
T1542.002
: Component Firmware
Kill Chain: persistence
T1556
: Modify Authentication Process
Kill Chain: credential-access
Malware
APTs Threat Group Associations
Campaigns
Affected Products
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me