Improper Verification of Cryptographic Signature Affecting OpenSC/pam_pkcs11 package, versions [0.6.0,0.6.13)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-OPENSCPAMPKCS11-8709969
  • published11 Feb 2025
  • disclosed10 Feb 2025
  • creditFrank Morgner

Introduced: 10 Feb 2025

NewCVE-2025-24032  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade OpenSC/pam_pkcs11 to version 0.6.13 or higher.

Overview

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in pam_sm_authenticate() in pam_pkcs11.c. When the default configuration of cert_policy none is in use, an attacker can bypass authentication and log in as another user by creating a token with the user's public data and a known PIN, without needing to provide a signature with the private key.

Workaround

This vulnerability can be avoided by setting cert_policy = signature; in pam_pkcs11.conf.

CVSS Scores

version 4.0
version 3.1