CVE-2025-6018

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2025-6018 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2372693 Issue Tracking Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1243226 Exploit Third Party Advisory
https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Exploit Issue Tracking Third Party Advisory
https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:suse:pam-config:1.1.8-24.71.1:*:*:*:*:*:*:*

History

09 Oct 2025, 15:55

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una vulnerabilidad de Escalada de Privilegios Locales (LPE) en pam-config, dentro de los Módulos de Autenticación Conectables (PAM) de Linux. Esta falla permite a un atacante local sin privilegios (por ejemplo, un usuario conectado por SSH) obtener los privilegios elevados normalmente reservados para un usuario "allow_active" físicamente presente. El mayor riesgo es que el atacante pueda entonces realizar todas las acciones "allow_active yes" de Polkit, que normalmente están restringidas a los usuarios de consola, lo que podría permitirle obtener control no autorizado sobre las configuraciones del sistema, los servicios u otras operaciones sensibles.
References () https://access.redhat.com/security/cve/CVE-2025-6018 - () https://access.redhat.com/security/cve/CVE-2025-6018 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2372693 - () https://bugzilla.redhat.com/show_bug.cgi?id=2372693 - Issue Tracking, Third Party Advisory
References () https://bugzilla.suse.com/show_bug.cgi?id=1243226 - () https://bugzilla.suse.com/show_bug.cgi?id=1243226 - Exploit, Third Party Advisory
References () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt - () https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt - Exploit, Issue Tracking, Third Party Advisory
First Time Suse
Suse pam-config
CPE cpe:2.3:a:suse:pam-config:1.1.8-24.71.1:*:*:*:*:*:*:*

23 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-23 15:15

Updated : 2025-10-09 15:55


NVD link : CVE-2025-6018

Mitre link : CVE-2025-6018

CVE.ORG link : CVE-2025-6018


JSON object : View

Products Affected

suse

  • pam-config
CWE
CWE-863

Incorrect Authorization