Authentication Bypass in Yubico PAM Module
CVE-2011-4120
9.8CRITICAL
What is CVE-2011-4120?
The Yubico PAM Module, prior to version 2.10, contains a significant vulnerability that allows a remote attacker to bypass standard user authentication. This occurs when the configuration option 'use_first_pass' is not enabled, allowing the module to be set as 'sufficient' in the PAM configuration. In this scenario, an attacker can gain unauthorized access by submitting a NULL value, such as a Ctrl-D keyboard sequence, as the password, effectively circumventing the authentication process.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
yubico-pam before 2.10
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
