Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6018

Опубликовано: 17 июн. 2025
Источник: redhat
CVSS3: 7.8

Описание

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

Отчет

This vulnerability does not affect the code base of Red Hat Linux PAM distribution.

Меры по смягчению последствий

Currently, there is no mitigation available for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7pamNot affected
Red Hat Enterprise Linux 8pamNot affected
Red Hat Enterprise Linux 9pamNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=2372693pam-config: LPE from unprivileged to allow_active in PAM

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
14 дней назад

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

CVSS3: 7.8
nvd
14 дней назад

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

CVSS3: 7.8
debian
14 дней назад

A Local Privilege Escalation (LPE) vulnerability has been discovered i ...

suse-cvrf
около 1 месяца назад

Security update for pam-config

suse-cvrf
около 1 месяца назад

Security update for pam-config

7.8 High

CVSS3