Network authentication attack via pam_krb5
CVE-2023-3326
9.8CRITICAL
What is CVE-2023-3326?
The pam_krb5 module in FreeBSD, when configured without a keytab, allows attackers with control of both user passwords and KDC responses to gain authentication access by presenting a valid ticket-granting ticket (TGT) over the network. This vulnerability exposes systems to unauthorized access, as the module fails to validate the TGT response correctly. This scenario is particularly dangerous in non-default FreeBSD installations where pam_krb5 is utilized for user authentication.
Affected Version(s)
FreeBSD 13.2-RELEASE < 13.2-RELEASE-p1
FreeBSD 13.1-RELEASE < 13.1-RELEASE-p8
FreeBSD 12.4-RELEASE < 12.4-RELEASE-p3
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Taylor R Campbell <[email protected]>