Improper Authentication Affecting yubico/pam-u2f package, versions [,1.3.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-YUBICOPAMU2F-8628490
  • published15 Jan 2025
  • disclosed15 Jan 2025
  • creditMatthias Gerstner

Introduced: 15 Jan 2025

NewCVE-2025-23013  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade yubico/pam-u2f to version 1.3.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Authentication allowing authentication bypass in certain configurations. An attacker can gain elevated privileges by exploiting this vulnerability when they have access to the system as an unprivileged user and, depending on the configuration, may also need to know the user's password.

Workaround

If using libpam, an alternative solution could be to disable the nouserok option and mark “ignore” control values with the action “bad” for all references of pam-u2f in the PAM stack ([success=ok default=bad]). OpenPAM implementation does not support this flexibility.

References

CVSS Scores

version 4.0
version 3.1