{"id":"CVE-2021-3551","details":"A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.","modified":"2026-03-14T10:56:07.076860Z","published":"2022-02-16T17:15:11.103Z","references":[{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1959971"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dogtagpki/pki","events":[{"introduced":"61297c6f97cb0e850a76307d1200b4a7c63f001c"},{"fixed":"1c0a7b45225aadc6efde21f92b0103937ae99d6d"}],"database_specific":{"versions":[{"introduced":"10.10.0"},{"fixed":"10.10.6"}]}}],"versions":["v10.10.0","v10.10.1","v10.10.2","v10.10.3","v10.10.4","v10.10.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"8-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3551.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}