SB2020061082 - Exposure of TACACS+ shared secret in pam_tacplus
Published: June 10, 2020 Updated: May 17, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2020-13881)
The vulnerability allows a local user to gain access to sensitive information.
The
vulnerability exists due to software stores TACACS+ encryption key into
log file if the DEBUG loglevel and journald are used. A local user can read the log files and gain access to
sensitive data. This information can be used to decrypt communication
between the TACACS+ server and the end user, exposing authentication
credentials.
Remediation
Install update from vendor's website.
References
- https://github.com/kravietz/pam_tacplus/issues/149
- https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0
- http://www.openwall.com/lists/oss-security/2020/06/08/1
- https://lists.debian.org/debian-lts-announce/2020/06/msg00007.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/11705-security-advisory-50
- https://usn.ubuntu.com/4521-1/
- https://lists.debian.org/debian-lts-announce/2021/08/msg00006.html