CVE-2025-6018
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/07/2025
Last modified:
04/11/2025
Description
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:suse:pam-config:1.1.8-24.71.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/security/cve/CVE-2025-6018
- https://bugzilla.redhat.com/show_bug.cgi?id=2372693
- https://bugzilla.suse.com/show_bug.cgi?id=1243226
- https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt
- http://www.openwall.com/lists/oss-security/2025/08/28/4
- https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt



