CVE-2026-34397

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From versions 2.0.0-alpha to before 2.3.9 and 3.0.0-alpha to before 3.1.1, there is a conditional local privilege escalation vulnerability in an edge-case naming collision. Only authenticated himmelblau users whose mapped CN/short name exactly matches a privileged local group name (e.g., "sudo", "wheel", "docker", "adm") can cause the NSS module to resolve that group name to their fake primary group. If the system uses NSS results for group-based authorization decisions (sudo, polkit, etc.), this can grant the attacker the privileges of that group. This issue has been patched in versions 2.3.9 and 3.1.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:*
cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:*

History

15 Apr 2026, 15:17

Type Values Removed Values Added
CPE cpe:2.3:a:himmelblau-idm:himmelblau:*:*:*:*:*:*:*:*
First Time Himmelblau-idm
Himmelblau-idm himmelblau
References () https://github.com/himmelblau-idm/himmelblau/releases/tag/2.3.9 - () https://github.com/himmelblau-idm/himmelblau/releases/tag/2.3.9 - Product, Release Notes
References () https://github.com/himmelblau-idm/himmelblau/releases/tag/3.1.1 - () https://github.com/himmelblau-idm/himmelblau/releases/tag/3.1.1 - Product, Release Notes
References () https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-v7xx-7mqc-g835 - () https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-v7xx-7mqc-g835 - Exploit, Mitigation, Vendor Advisory

01 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 18:16

Updated : 2026-04-15 17:14


NVD link : CVE-2026-34397

Mitre link : CVE-2026-34397

CVE.ORG link : CVE-2026-34397


JSON object : View

Products Affected

himmelblau-idm

  • himmelblau
CWE
CWE-269

Improper Privilege Management