Authentication Bypass in PAM-PKCS#11 due to Weak Default `cert_policy` Setting

Overview

CVE-2025-24032 identifies a critical vulnerability in PAM-PKCS#11, a Linux-PAM module enabling X.509 certificate-based authentication.

Technical Details

The vulnerability, classified under CWE-287: Improper Authentication, arises when cert_policy is set to none (default). In such cases, pam_pkcs11 validates only that a user can log into a token—without requiring private key signature verification.

This means an attacker can craft a token using a victim’s public certificate and a known PIN. Since no signature is required, the attacker can bypass authentication and gain unauthorized access.

Severity and CVSS

  • CVSS 4.0 Base Score: 9.2 (Critical)
  • Vector: AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L

Affected Versions

All versions prior to pam_pkcs11-0.6.13 are impacted.

Mitigation and Recommendations

  • Upgrade to version 0.6.13 immediately.
  • In pam_pkcs11.conf, set cert_policy = signature; explicitly to enforce private key verification.

Conclusion

This vulnerability demonstrates the dangers of insecure default configurations. Ensuring that authentication relies on proper cryptographic verification is critical for maintaining secure login workflows.

For more technical details and mitigation steps, refer to the official GitHub advisory.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *