Metrics
Affected Vendors & Products
Mon, 03 Feb 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 16 Jan 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 16 Jan 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 16 Jan 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 16 Jan 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Jan 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 15 Jan 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-394 | |
Metrics |
cvssV4_0
|
Wed, 15 Jan 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-03T10:03:09.695Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2025-23013

Updated: 2025-02-03T10:03:09.695Z

Status : Awaiting Analysis
Published: 2025-01-15T04:15:20.037
Modified: 2025-02-03T10:15:09.250
Link: CVE-2025-23013

No data.