Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4040-1 | pam-u2f security update |
Debian DSA |
DSA-5853-1 | pam-u2f security update |
EUVD |
EUVD-2025-3074 | In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password. |
Ubuntu USN |
USN-7806-1 | PAM/U2F vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 03 Feb 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Jan 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Jan 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Jan 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 16 Jan 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 15 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Jan 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 15 Jan 2025 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-394 | |
| Metrics |
cvssV4_0
|
Wed, 15 Jan 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-03T10:03:09.695Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2025-23013
Updated: 2025-02-03T10:03:09.695Z
Status : Awaiting Analysis
Published: 2025-01-15T04:15:20.037
Modified: 2025-02-03T10:15:09.250
Link: CVE-2025-23013
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:18Z
Debian DLA
Debian DSA
EUVD
Ubuntu USN