EUVD-2026-11774

| CVE-2026-4105 MEDIUM
2026-03-13 redhat
6.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 13, 2026 - 09:29 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 09:29 euvd
EUVD-2026-11774
CVE Published
Mar 13, 2026 - 08:52 nvd
MEDIUM 6.7

Description

A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.

Analysis

High severity vulnerability in systemd. A flaw was found in systemd. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 30 days: Identify affected systems and apply vendor patches as part of regular patch cycle. Monitor vendor channels for patch availability.

Sign in for detailed remediation steps.

Priority Score

34
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +34
POC: 0

Vendor Status

Debian

systemd
Release Status Fixed Version Urgency
bullseye vulnerable 247.3-7+deb11u5 -
bullseye (security) vulnerable 247.3-7+deb11u7 -
bookworm vulnerable 252.39-1~deb12u1 -
bookworm (security) vulnerable 252.38-1~deb12u1 -
trixie vulnerable 257.9-1~deb13u1 -
forky vulnerable 260~rc2-1 -
sid fixed 260~rc3-1 -
(unstable) fixed 260~rc3-1 -

Share

EUVD-2026-11774 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy