๐Ÿ” CVE Alert

CVE-2024-10963

HIGH 7.4

Pam: improper hostname interpretation in pam_access leads to access control bypass

CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.

CWE CWE-287
Published Nov 7, 2024
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected
Red Hat / Red Hat OpenShift AI 2.16
All versions affected
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10232 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10244 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10379 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10518 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10528 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10852 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-10963 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2324291 github.com: https://github.com/linux-pam/linux-pam/issues/834 github.com: https://github.com/linux-pam/linux-pam/pull/835