Linux X.509 Certificate-Based User Login Flaws Let Attackers Bypass Authentication

Three critical vulnerabilities have been identified in the PAM-PKCS#11 module, a widely used Linux-PAM login module that facilitates X.509 certificate-based user authentication. These vulnerabilities, cataloged under CVE-2025-24032, CVE-2025-24531, and CVE-2025-24031, pose significant risks by allowing attackers to bypass authentication mechanisms, potentially leading to unauthorized access and system disruptions. CVE-2025-24032 – Authentication Bypass via Token Hijacking […] The post Linux X.509 Certificate-Based User Login Flaws Let Attackers Bypass Authentication appeared first on Cyber Security News.

Feb 12, 2025 - 09:25
 0
Linux X.509 Certificate-Based User Login Flaws Let Attackers Bypass Authentication

Three critical vulnerabilities have been identified in the PAM-PKCS#11 module, a widely used Linux-PAM login module that facilitates X.509 certificate-based user authentication.

These vulnerabilities, cataloged under CVE-2025-24032, CVE-2025-24531, and CVE-2025-24031, pose significant risks by allowing attackers to bypass authentication mechanisms, potentially leading to unauthorized access and system disruptions.

CVE-2025-24032 – Authentication Bypass via Token Hijacking

The first vulnerability, CVE-2025-24032, affects versions of PAM-PKCS#11 prior to 0.6.13. Here, if the cert_policy is set to none (which is the default setting), the module only verifies if a user can log into the token without checking the private key’s signature.

This flaw allows an attacker to create a token with the user’s public certificate and a known PIN, thereby logging in as the user without needing the private key.

This vulnerability has been classified as high severity due to its potential for unauthorized access. The fix involves upgrading to version 0.6.13 or later, where the default behavior has been changed to require a signature check.

CVE-2025-24531 – Authentication Bypass in Error Situations

The second issue, CVE-2025-24531, was introduced in version 0.6.12 of PAM-PKCS#11 and fixed in version 0.6.13. This vulnerability allows for an authentication bypass in error situations, particularly when memory allocation fails or during incorrect privilege changes.

The module returns PAM_IGNORE, which can lead to an authentication bypass if the nouserok option is enabled, allowing attackers to log in without proper verification.

CVE-2025-24031 – Segmentation Fault on PIN Entry

Lastly, CVE-2025-24031 affects versions 0.6.12 and prior, where the module segfaults if a user cancels the PIN entry process (by pressing ctrl-c or ctrl-d). This leads to a denial of service as the system crashes, impacting availability. The recommended mitigation is to update to version 0.6.13 or later, which includes a patch for this issue.

Mitigation and Recommendations

To mitigate these vulnerabilities, users are urged to:

  • Upgrade to PAM-PKCS#11 version 0.6.13 or later to address all three vulnerabilities.
  • Configure cert_policy = signature; in pam_pkcs11.conf as a workaround for CVE-2025-24032.
  • Monitor and restart affected services if they crash due to CVE-2025-24031.
  • Implement additional access controls and educate users about the risks of canceling PIN entry.

These vulnerabilities underscore the importance of regular updates and careful configuration of authentication modules in Linux environments to prevent unauthorized access and ensure system integrity.

Users and system administrators should take immediate action to secure their systems against these potential threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post Linux X.509 Certificate-Based User Login Flaws Let Attackers Bypass Authentication appeared first on Cyber Security News.