CVE-2026-4948 PUBLISHED

Firewalld: firewalld: local unprivileged user can modify firewall state due to d-bus setter mis-authorization

Assigner: redhat
Reserved: 27.03.2026 Published: 27.03.2026 Updated: 27.03.2026

A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS Score: 5.5

Product Status

Vendor Red Hat
Product Red Hat Enterprise Linux 10
Versions Default: unknown
Vendor Red Hat
Product Red Hat Enterprise Linux 7
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 8
Versions Default: unknown
Vendor Red Hat
Product Red Hat Enterprise Linux 9
Versions Default: unknown
Vendor Red Hat
Product Red Hat OpenShift Container Platform 4
Versions Default: unknown

Workarounds

To mitigate this issue, ensure that the firewalld desktop policy is not active on systems where local unprivileged user access is a concern. If firewalld is not required, it can be disabled. Disabling firewalld may impact network services that rely on it.

To disable firewalld: sudo systemctl stop firewalld sudo systemctl disable firewalld

A system restart or service reload may be required for changes to take full effect.

Credits

  • Red Hat would like to thank Asim Viladi Oglu Manizada for reporting this issue.

References

Problem Types

  • Incorrect Execution-Assigned Permissions CWE