CVE-2024-10963
Rocky Linux vulnerability analysis and mitigation

Overview

A flaw was found in pamaccess (CVE-2024-10963), where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability was discovered in November 2024 and affects the Pluggable Authentication Modules (PAM) system, specifically impacting systems that rely on pamaccess for controlling access to services or terminals (NVD, Red Hat).

Technical details

The vulnerability exists in the pam_access module where it incorrectly interprets local access.conf rules as remote hostnames. This flaw was introduced in version 1.5.3 and affects the authentication mechanism. The issue has a CVSS v3.1 base score of 7.4 (High), with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N (Ubuntu, NVD).

Impact

This vulnerability allows attackers to bypass access restrictions by spoofing hostnames, potentially gaining unauthorized access to systems. The issue compromises configurations intended to restrict local access only, affecting systems that rely on pam_access feature to control who can access certain services or terminals (Red Hat).

Mitigation and workarounds

A fix has been released that introduces a new option called 'nodns' that reverts behavior to pre-1.5.3 and safely allows tty/service names in access.conf. Updates are available for various versions of Red Hat Enterprise Linux and OpenShift Container Platform. Users are advised to upgrade to the patched versions (Ubuntu, Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management