CVE-2018-14345 — Improper Authentication in Project Sddm
Severity
7.5HIGHNVD
EPSS
0.2%
top 52.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 17
Latest updateMay 13
Description
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9
Affected Packages2 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2018-14345: sddm - An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=...↗2018
💬Community
3Bugzilla▶
CVE-2018-14345 sddm: Password not checked for users with an already existing session if ReuseSession=true [epel-7]↗2018-07-19
Bugzilla▶
CVE-2018-14345 sddm: Password not checked for users with an already existing session if ReuseSession=true↗2018-07-19
Bugzilla▶
CVE-2018-14345 sddm: Password not checked for users with an already existing session if ReuseSession=true [fedora-all]↗2018-07-19