Impact
Improper neutralization of CRLF sequences ('CRLF injection') in TUBITAK BILGEM Software Technologies Research Institute Pardus Update allows an attacker to bypass authentication by sending crafted input that the system mishandles. This permits authentication without valid credentials and grants unrestricted access to the system.
Affected Systems
TUBITAK BILGEM Software Technologies Research Institute Pardus Update is affected, with vulnerable releases including 0.6.3 and earlier.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity vulnerability, and the EPSS score of <1% shows exploitation probability is low but not zero. The vulnerability could be exploited remotely if the authentication component is exposed over a network, or locally if the attacker can influence input to the affected process; this attack vector is inferred rather than explicitly stated. The vulnerability is not listed in the CISA KEV catalog, though it remains a serious risk for affected installations.
OpenCVE Enrichment