#VU71525 Incorrect authorization in linux-pam - CVE-2022-28321

 

#VU71525 Incorrect authorization in linux-pam - CVE-2022-28321

Published: January 25, 2023 / Updated: May 26, 2023


Vulnerability identifier: #VU71525
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-28321
CWE-ID: CWE-863
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
linux-pam
Software vendor:
git.kernel.org

Description

The vulnerability allows a remote attacker to bypass authorization process.

The vulnerability exists due to an error within the pam_access.so module in Linux-PAM package, which does not correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS.  A remote attacker can bypass authorization process and login to the system via SSH from IP addresses that were not allowed to connect from.


Remediation

Install updates from vendor's website.

External links