Vulnerability Details : CVE-2023-3326
pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-3326
- cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p6:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.1:p7:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3326
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3326
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-3326
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.Assigned by: secteam@freebsd.org (Secondary)
References for CVE-2023-3326
-
https://security.netapp.com/advisory/ntap-20230714-0005/
CVE-2023-3326 FreeBSD Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:09.pam_krb5.asc
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:04.pam_krb5.asc
Mitigation;Vendor Advisory
Jump to