Authentication Bypass in Linux-PAM for openSUSE Tumbleweed
CVE-2022-28321

9.8CRITICAL

Key Information:

Vendor

Linux-pam

Status
Vendor
CVE Published:
19 September 2022

What is CVE-2022-28321?

The Linux-PAM package on openSUSE Tumbleweed prior to version 1.5.2-6.1 is susceptible to an authentication bypass vulnerability. This flaw occurs when the pam_access.so module fails to restrict login attempts from non-resolvable IP addresses via DNS. Consequently, users who should be denied access to a machine can potentially gain unauthorized access through SSH logins. It is important to note that this issue primarily affects openSUSE Tumbleweed and openSUSE Factory, with no impact on Linux-PAM upstream versions.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.