Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-6018 |
CWE-ID | CWE-16 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Basesystem Module Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system pam_pkcs11-64bit Operating systems & Components / Operating system package or component pam_pkcs11-64bit-debuginfo Operating systems & Components / Operating system package or component pam_pkcs11-devel-doc Operating systems & Components / Operating system package or component pam_pkcs11-32bit Operating systems & Components / Operating system package or component pam_pkcs11-32bit-debuginfo Operating systems & Components / Operating system package or component pam_pkcs11 Operating systems & Components / Operating system package or component pam_pkcs11-debugsource Operating systems & Components / Operating system package or component pam_pkcs11-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU111387
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2025-6018
CWE-ID:
CWE-16 - Configuration
Exploit availability: Yes
DescriptionThe issue may allow a local user to escalate privileges on the system.
The issue exists due an error in the PAM configuration of openSUSE Leap 15 and SUSE Linux Enterprise 15. An unprivileged user who logs in via sshd can force the pam_env module to add arbitrary variables to PAM's environment, leading to arbitrary code execution as root.
MitigationUpdate the affected package pam_pkcs11 to the latest version.
Vulnerable software versionsBasesystem Module: 15-SP6 - 15-SP7
SUSE Linux Enterprise Real Time 15: SP6 - SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP6 - SP7
SUSE Linux Enterprise Server 15: SP6 - SP7
SUSE Linux Enterprise Desktop 15: SP6 - SP7
openSUSE Leap: 15.6
pam_pkcs11-64bit: before 0.6.10-150600.16.8.1
pam_pkcs11-64bit-debuginfo: before 0.6.10-150600.16.8.1
pam_pkcs11-devel-doc: before 0.6.10-150600.16.8.1
pam_pkcs11-32bit: before 0.6.10-150600.16.8.1
pam_pkcs11-32bit-debuginfo: before 0.6.10-150600.16.8.1
pam_pkcs11: before 0.6.10-150600.16.8.1
pam_pkcs11-debugsource: before 0.6.10-150600.16.8.1
pam_pkcs11-debuginfo: before 0.6.10-150600.16.8.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502026-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.