VMware Tanzu Isolation Segment update for linux-pam

Published: 2023-05-26
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-28321
Exploitation vector Network
Public exploit N/A
Vulnerable software
Platform Automation Toolkit
Other software / Other software solutions

Vendor VMware, Inc

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Incorrect authorization

EUVDB-ID: #VU71525

Risk: Medium


CVE-ID: CVE-2022-28321

CWE-ID: CWE-863 - Incorrect Authorization

Exploit availability: No


The vulnerability allows a remote attacker to bypass authorization process.

The vulnerability exists due to an error within the pam_access.so module in Linux-PAM package, which does not correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS.  A remote attacker can bypass authorization process and login to the system via SSH from IP addresses that were not allowed to connect from.


Install update from vendor's website.

Vulnerable software versions

Platform Automation Toolkit: before 5.0.24

CPE2.3 External links


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?