CVE-2025-23013

NameCVE-2025-23013
DescriptionIn Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4040-1, DSA-5853-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pam-u2f (PTS)bullseye (security)1.1.0-1.1+deb11u1fixed
bookworm, bullseye1.1.0-1.1vulnerable
bookworm (security)1.1.0-1.1+deb12u1fixed
sid, trixie1.3.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pam-u2fsourcebullseye1.1.0-1.1+deb11u1DLA-4040-1
pam-u2fsourcebookworm1.1.0-1.1+deb12u1DSA-5853-1
pam-u2fsource(unstable)1.3.1-1

Notes

Fixed by: https://github.com/Yubico/pam-u2f/commit/a96ef17f74b8e4ed80a97322120af1a228a1ffb7 (pam_u2f-1.3.1)
Fixed by: https://github.com/Yubico/pam-u2f/commit/08199144d870a63275a4601dbc6751ac68d48301 (pam_u2f-1.3.1)
https://www.yubico.com/support/security-advisories/ysa-2025-01/
https://www.openwall.com/lists/oss-security/2025/01/15/1
Related (authfile) hardening (not part of the CVE):
https://github.com/Yubico/pam-u2f/commit/51cea61c89b750cad899eb2d34299d5d41d04090 (pam_u2f-1.3.1)
https://github.com/Yubico/pam-u2f/commit/f573707012f92e31172a7b14b6e36f8e93a02478 (pam_u2f-1.3.2)

Search for package or bug name: Reporting problems