Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
|
06 Nov 2025, 14:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-4034 - US Government Resource |
22 Oct 2025, 00:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Apr 2025, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034 - Exploit, Third Party Advisory |
21 Nov 2024, 06:36
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html - Third Party Advisory, VDB Entry | |
| References | () https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 - Mitigation, Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2025869 - Issue Tracking, Patch | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf - Third Party Advisory | |
| References | () https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 - Patch | |
| References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
| References | () https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt - Exploit, Mitigation, Third Party Advisory | |
| References | () https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ - Exploit, Third Party Advisory | |
| References | () https://www.starwindsoftware.com/security/sw-20220818-0001/ - Third Party Advisory | |
| References | () https://www.suse.com/support/kb/doc/?id=000020564 - Third Party Advisory |
05 Nov 2024, 19:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE |
28 Jun 2024, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2025869 - Issue Tracking, Patch | |
| References | () https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 - Patch | |
| References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
| References | () https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ - Exploit, Third Party Advisory |
25 Oct 2022, 16:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:starwindsoftware:starwind_hyperconverged_appliance:-:*:*:*:*:*:*:* cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:* cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:* |
|
| References | (MISC) https://www.starwindsoftware.com/security/sw-20220818-0001/ - Third Party Advisory |
11 Oct 2022, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* |
|
| References |
|
|
| References | (MISC) http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html - Third Party Advisory, VDB Entry | |
| References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Third Party Advisory | |
| References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf - Third Party Advisory |
14 Jun 2022, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
20 Apr 2022, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Apr 2022, 09:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html - Third Party Advisory | |
| References | (MISC) http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
| References | (MISC) https://www.suse.com/support/kb/doc/?id=000020564 - Third Party Advisory | |
| CPE | cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:* cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:* cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:* cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:* |
14 Apr 2022, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Mar 2022, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Mar 2022, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
31 Jan 2022, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
| References | (MISC) https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt - Exploit, Mitigation, Third Party Advisory | |
| References | (MISC) https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 - Patch, Third Party Advisory | |
| References | (MISC) https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 - Mitigation, Vendor Advisory | |
| References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2025869 - Issue Tracking, Patch, Vendor Advisory | |
| CWE | CWE-787 |
28 Jan 2022, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Published : 2022-01-28 20:15
Updated : 2025-11-06 14:50
NVD link : CVE-2021-4034
Mitre link : CVE-2021-4034
CVE.ORG link : CVE-2021-4034
JSON object : View
redhat
- enterprise_linux_server_eus
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_tus
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux_for_scientific_computing
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_power_big_endian
- enterprise_linux_server_aus
- enterprise_linux_for_power_little_endian_eus
starwindsoftware
- command_center
- starwind_virtual_san
canonical
- ubuntu_linux
oracle
- http_server
- zfs_storage_appliance_kit
siemens
- scalance_lpe9403_firmware
- sinumerik_edge
- scalance_lpe9403
polkit_project
- polkit
suse
- linux_enterprise_desktop
- manager_proxy
- enterprise_storage
- linux_enterprise_workstation_extension
- linux_enterprise_high_performance_computing
- manager_server
- linux_enterprise_server
