Impact
openCryptoki's token directory file operations resolve symbolic links when executing as a privileged user. A token‑group member can place symlinks that redirect file operations to arbitrary filesystem targets. This flaw allows the attacker to create or modify files with root ownership or change permissions on arbitrary files, leading to privilege escalation or data exposure.
Affected Systems
The issue affects the openCryptoki PKCS#11 library and its administrative tools on Linux and AIX for all releases 2.3.2 and newer.
Risk and Exploitability
The CVSS score of 6.8 and EPSS <1% suggest moderate severity but overall low exploitation probability. The vulnerability requires a token‑group user having write access to token directories, then the presence of an administrator running a maintenance operation such as chown on files inside the token directory while running as root. The flaw is local and is not currently listed in the CISA KEV catalog, indicating limited active exploitation.
OpenCVE Enrichment