Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-3825 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
GNOME Display Manager Client/Desktop applications / Other client software |
Vendor | Gnome Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU17666
Risk: Low
CVSSv3.1: 3.6 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-3825
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a physical attacker to bypass security restrictions on the system.
The vulnerability exists due to improper security restrictions imposed by the affected software when timed login is enabled. A local attacker with physical access can select the timed login user and wait for the timer to expire that allows to bypass security restrictions and gain access to the logged-in user’s session on the targeted system.
MitigationUpdate to version 3.31.4.
Vulnerable software versionsGNOME Display Manager: 3.0.0 - 3.30.2
External linkshttp://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.