A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-22455 A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Fixes

Solution

No solution given by the vendor.


Workaround

Currently, there is no mitigation available for this vulnerability.

History

Thu, 09 Oct 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Suse
Suse pam-config
CPEs cpe:2.3:a:suse:pam-config:1.1.8-24.71.1:*:*:*:*:*:*:*
Vendors & Products Suse
Suse pam-config

Wed, 23 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Title pam-config: LPE from unprivileged to allow_active in PAM Pam-config: lpe from unprivileged to allow_active in pam
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Sun, 22 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
References

Thu, 19 Jun 2025 03:45:00 +0000

Type Values Removed Values Added
Description A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Title pam-config: LPE from unprivileged to allow_active in PAM
Weaknesses CWE-863
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-07-23T15:13:32.871Z

Reserved: 2025-06-11T22:14:44.782Z

Link: CVE-2025-6018

cve-icon Vulnrichment

Updated: 2025-07-23T15:12:43.308Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-23T15:15:34.810

Modified: 2025-10-09T15:55:11.957

Link: CVE-2025-6018

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-17T00:00:00Z

Links: CVE-2025-6018 - Bugzilla

cve-icon OpenCVE Enrichment

No data.