CVE-2025-10622

8.0 HIGH

📋 TL;DR

This vulnerability in Red Hat Satellite's Foreman component allows authenticated users with edit_settings permissions to execute arbitrary commands on the underlying operating system due to insufficient server-side validation of command whitelisting. It affects Red Hat Satellite deployments where users have edit_settings privileges. The flaw enables remote code execution with the privileges of the Foreman service.

💻 Affected Systems

Products:
  • Red Hat Satellite
Versions: Specific versions listed in Red Hat advisories (check references for exact ranges)
Operating Systems: RHEL-based systems running Red Hat Satellite
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with edit_settings permissions. The Foreman component is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with edit_settings permissions could gain full control of the Satellite server, potentially compromising the entire infrastructure management system and using it as a pivot point to attack managed systems.

🟠

Likely Case

Privileged users or compromised accounts with edit_settings permissions could execute arbitrary commands, potentially leading to data theft, service disruption, or lateral movement within the network.

🟢

If Mitigated

With proper access controls limiting edit_settings permissions to essential personnel only, the attack surface is significantly reduced, though the vulnerability remains present in the software.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific permissions. The vulnerability is in command whitelisting validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific Red Hat Satellite versions in referenced advisories

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-10622

Restart Required: Yes

Instructions:

1. Review Red Hat advisories RHSA-2025:19721, RHSA-2025:19832, RHSA-2025:19855, RHSA-2025:19856. 2. Apply the appropriate Satellite update for your version. 3. Restart Satellite services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict edit_settings permissions

linux

Temporarily limit edit_settings permissions to only absolutely necessary users until patching can be completed

# Review and modify user permissions in Satellite web UI or via hammer CLI

🧯 If You Can't Patch

  • Immediately review and restrict edit_settings permissions to minimal necessary users
  • Implement network segmentation to isolate Satellite servers from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check your Red Hat Satellite version against the affected versions in the Red Hat advisories

Check Version:

satellite-maintain health check --version or check Satellite web UI

Verify Fix Applied:

Verify Satellite version is updated to a patched version listed in Red Hat advisories and test edit_settings functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in Foreman logs
  • Multiple failed permission escalation attempts
  • Unexpected system commands from Satellite service account

Network Indicators:

  • Unusual outbound connections from Satellite server
  • Unexpected SSH or remote access attempts originating from Satellite

SIEM Query:

source="satellite.logs" AND ("command execution" OR "permission denied" OR "edit_settings")

🔗 References

📤 Share & Export