A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-6018 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2372693 | Issue Tracking Third Party Advisory |
| https://bugzilla.suse.com/show_bug.cgi?id=1243226 | Exploit Third Party Advisory |
| https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt | Exploit Issue Tracking Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2025/08/28/4 | |
| https://cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt | Exploit Issue Tracking Third Party Advisory |
Configurations
History
04 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-07-23 15:15
Updated : 2025-11-04 22:16
NVD link : CVE-2025-6018
Mitre link : CVE-2025-6018
CVE.ORG link : CVE-2025-6018
JSON object : View
Products Affected
suse
- pam-config
CWE
CWE-863
Incorrect Authorization
