CVE-2020-27780

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1901094

Details

Source: MITRE

Published: 2020-12-18

Updated: 2020-12-28

Type: CWE-287

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
144091Fedora 32 : pam (2020-bd83344365)NessusFedora Local Security Checks
critical
143493GLSA-202012-06 : Linux-PAM: Authentication bypassNessusGentoo Local Security Checks
critical
143326Fedora 33 : pam (2020-22532a1a81)NessusFedora Local Security Checks
critical