{
  "threat_severity" : "Moderate",
  "public_date" : "2022-03-17T00:00:00Z",
  "bugzilla" : {
    "description" : "pcs: improper authentication via PAM",
    "id" : "2066629",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2066629"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-287",
  "details" : [ "A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.", "A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon allowed expired accounts and accounts with expired passwords to log in when using PAM authentication. Unprivileged, expired accounts with previously denied access could still log in." ],
  "statement" : "This flaw has been rated as having a security impact of Moderate.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-11-08T00:00:00Z",
    "advisory" : "RHSA-2022:7447",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8::highavailability",
    "package" : "pcs-0:0.10.14-5.el8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-11-15T00:00:00Z",
    "advisory" : "RHSA-2022:7935",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9::highavailability",
    "package" : "pcs-0:0.11.3-4.el9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "pcs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-1049\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-1049\nhttps://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5/" ],
  "name" : "CVE-2022-1049",
  "csaw" : false
}