A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | pam-config: LPE from unprivileged to allow_active in PAM | Pam-config: lpe from unprivileged to allow_active in pam |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
|
Sun, 22 Jun 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 19 Jun 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations. | |
Title | pam-config: LPE from unprivileged to allow_active in PAM | |
Weaknesses | CWE-863 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-07-23T14:58:59.750Z
Updated: 2025-07-23T15:13:32.871Z
Reserved: 2025-06-11T22:14:44.782Z
Link: CVE-2025-6018

Updated: 2025-07-23T15:12:43.308Z

Status : Awaiting Analysis
Published: 2025-07-23T15:15:34.810
Modified: 2025-07-25T15:29:44.523
Link: CVE-2025-6018
