CVE-2023-3326
Network authentication attack via pam_krb5
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
pam_krb5 authenticates the user by essentially running kinit(1) with the password, getting a ticket-granting ticket' (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. Normally, the system running the pam_krb5 module will also have a keytab, a key provisioned by the KDC. The pam_krb5 module will use the tgt to get a service ticket and validate it against the keytab, ensuring the tgt is valid and therefore, the password is valid. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-06-19 CVE Reserved
- 2023-06-21 CVE Published
- 2024-12-05 CVE Updated
- 2025-08-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
- CWE-303: Incorrect Implementation of Authentication Algorithm
CAPEC
- CAPEC-114: Authentication Abuse
References (3)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20230714-0005 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:04.pam_krb5.asc | 2023-08-01 | |
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:09.pam_krb5.asc | 2023-08-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | < 12.4 Search vendor "Freebsd" for product "Freebsd" and version " < 12.4" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | >= 13.0 < 13.1 Search vendor "Freebsd" for product "Freebsd" and version " >= 13.0 < 13.1" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 12.4 Search vendor "Freebsd" for product "Freebsd" and version "12.4" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 12.4 Search vendor "Freebsd" for product "Freebsd" and version "12.4" | p1 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 12.4 Search vendor "Freebsd" for product "Freebsd" and version "12.4" | p2 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 12.4 Search vendor "Freebsd" for product "Freebsd" and version "12.4" | rc2-p1 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 12.4 Search vendor "Freebsd" for product "Freebsd" and version "12.4" | rc2-p2 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | b1-p1 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | b2-p2 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p1 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p2 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p3 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p4 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p5 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p6 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | p7 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.1 Search vendor "Freebsd" for product "Freebsd" and version "13.1" | rc1-p1 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 13.2 Search vendor "Freebsd" for product "Freebsd" and version "13.2" | - |
Affected
|