Логотип exploitDog
bind:"BDU:2025-09007" OR bind:"CVE-2025-24032"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-09007" OR bind:"CVE-2025-24032"

Количество 8

Количество 8

fstec логотип

BDU:2025-09007

6 месяцев назад

Уязвимость модуля аутентификации PAM-PKCS#11 операционных систем Linux, позволяющая нарушителю обойти процесс аутентификации

CVSS3: 10
EPSS: Низкий
ubuntu логотип

CVE-2025-24032

6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

EPSS: Низкий
redhat логотип

CVE-2025-24032

6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

CVSS3: 8
EPSS: Низкий
nvd логотип

CVE-2025-24032

6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

EPSS: Низкий
debian логотип

CVE-2025-24032

6 месяцев назад

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificat ...

EPSS: Низкий
redos логотип

ROS-20250723-01

29 дней назад

Уязвимость pam_pkcs11

CVSS3: 8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0689-1

6 месяцев назад

Security update for pam_pkcs11

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0688-1

6 месяцев назад

Security update for pam_pkcs11

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-09007

Уязвимость модуля аутентификации PAM-PKCS#11 операционных систем Linux, позволяющая нарушителю обойти процесс аутентификации

CVSS3: 10
0%
Низкий
6 месяцев назад
ubuntu логотип
CVE-2025-24032

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

0%
Низкий
6 месяцев назад
redhat логотип
CVE-2025-24032

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

CVSS3: 8
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-24032

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.

0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-24032

PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificat ...

0%
Низкий
6 месяцев назад
redos логотип
ROS-20250723-01

Уязвимость pam_pkcs11

CVSS3: 8
0%
Низкий
29 дней назад
suse-cvrf логотип
SUSE-SU-2025:0689-1

Security update for pam_pkcs11

6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0688-1

Security update for pam_pkcs11

6 месяцев назад

Уязвимостей на страницу