Bug 2452086 (CVE-2026-4948)

Summary: CVE-2026-4948 firewalld: firewalld: Local unprivileged user can modify firewall state due to D-Bus setter mis-authorization
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2026-03-27 05:19:18 UTC
firewalld <=2.4.0 appears to mis-authorize two runtime D-Bus setters, setZoneSettings2 and setPolicySettings, by guarding them with PK_ACTION_CONFIG_INFO.  When the shipped desktop policy is active, that appears to let a local unprivileged user modify runtime firewall state without authentication. The attacker needs to have local, unprivileged access to a system with firewalld using the  desktop profile of firewalld.