A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
History

Wed, 23 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Title pam-config: LPE from unprivileged to allow_active in PAM Pam-config: lpe from unprivileged to allow_active in pam
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Sun, 22 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
References

Thu, 19 Jun 2025 03:45:00 +0000

Type Values Removed Values Added
Description A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Title pam-config: LPE from unprivileged to allow_active in PAM
Weaknesses CWE-863
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-07-23T14:58:59.750Z

Updated: 2025-07-23T15:13:32.871Z

Reserved: 2025-06-11T22:14:44.782Z

Link: CVE-2025-6018

cve-icon Vulnrichment

Updated: 2025-07-23T15:12:43.308Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-23T15:15:34.810

Modified: 2025-07-25T15:29:44.523

Link: CVE-2025-6018

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-17T00:00:00Z

Links: CVE-2025-6018 - Bugzilla