Improper Authentication in linux-pam - CVE-2020-27780

 

Improper Authentication in linux-pam - CVE-2020-27780

Published: December 7, 2020


Vulnerability identifier: #VU48796
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-27780
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: git.kernel.org
Affected software:
linux-pam

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when processing authentication requests in Linux PAM module. A remote or local attacker can bypass authentication process and gain unauthorized access to the application.

Successful exploitation of the vulnerability requires that the account used for authentication does not exists on the system and the password for root account is empty (but root locked down).


How to mitigate CVE-2020-27780

Install updates from vendor's website.

Sources