CVE-2021-31924Improper Authentication in Pam-u2f

Severity
6.8MEDIUMNVD
EPSS
0.1%
top 75.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 26
Latest updateMay 24

Description

Yubico pam-u2f before 1.1.1 has a logic issue that, depending on the pam-u2f configuration and the application used, could lead to a local PIN bypass. This issue does not allow user presence (touch) or cryptographic signature verification to be bypassed, so an attacker would still need to physically possess and interact with the YubiKey or another enrolled authenticator. If pam-u2f is configured to require PIN authentication, and the application using pam-u2f allows the user to submit NULL as th

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages3 packages

NVDyubico/pam-u2f< 1.1.1
Debianyubico/pam-u2f< 1.1.0-1.1+3
debiandebian/pam-u2f< pam-u2f 1.1.0-1.1 (bookworm)

Also affects: Fedora 34, 35

🔴Vulnerability Details

2
GHSA
GHSA-v2qj-ch59-r5g4: Yubico pam-u2f before 12022-05-24
OSV
CVE-2021-31924: Yubico pam-u2f before 12021-05-26

📋Vendor Advisories

1
Debian
CVE-2021-31924: pam-u2f - Yubico pam-u2f before 1.1.1 has a logic issue that, depending on the pam-u2f con...2021
CVE-2021-31924 — Improper Authentication in Pam-u2f | cvebase