Local Privilege Escalation in Linux Pluggable Authentication Modules (PAM) by Red Hat
CVE-2025-6018
Key Information:
- Vendor
- CVE Published:
- 23 July 2025
Badges
What is CVE-2025-6018?
A Local Privilege Escalation vulnerability exists in pam-config, part of the Linux Pluggable Authentication Modules (PAM). This flaw permits a local attacker, such as an SSH user, to escalate their privileges to those of a privileged console user. By exploiting this vulnerability, attackers can execute Polkit actions typically restricted to physically present users, resulting in unauthorized control over system settings, services, and sensitive operations.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Critical vulnerabilities CVE-2025-6018 and CVE-2025-6019 in Linux systems | Born's Tech and Windows World
[German]Security researchers from Qualys TRU have uncovered two linked, critical vulnerabilities in Linux. Starting with SUSE 15, the LPE chain leads directly to root access in standard configurations of many...
Multiple Vulnerabilities in Major Linux Distributions
Security researchers identified two new LPE vulnerabilities that can be chained together to gain root privileges on systems running major Linux distributions.
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
Linux systems face critical local privilege escalation threats via CVE-2025-6018/6019 flaws—users must patch now.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
- 📰
First article discovered by CyberSecurityNews
Vulnerability Reserved
