// For flags

CVE-2023-40660

Opensc: potential pin bypass when card tracks its own login state

Severity Score

6.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

Se encontró una falla en los paquetes OpenSC que permiten una posible omisión del PIN. Cuando un token/tarjeta es autenticado por un proceso, puede realizar operaciones criptográficas en otros procesos cuando se pasa un pin vacío de longitud cero. Este problema plantea un riesgo de seguridad, particularmente para el inicio de sesión/desbloqueo de pantalla del sistema operativo y para tokens pequeños conectados permanentemente a las maquinas. Además, el token puede rastrear internamente el estado de inicio de sesión. Esta falla permite que un atacante obtenga acceso no autorizado, lleve a cabo acciones maliciosas o comprometa el sistema sin que el usuario se de cuenta.

*Credits: Upstream acknowledges Deepanjan Pal (Oracle Corporation) as the original reporter.
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-08-18 CVE Reserved
  • 2023-11-06 CVE Published
  • 2023-12-14 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Opensc Project
Search vendor "Opensc Project"
Opensc
Search vendor "Opensc Project" for product "Opensc"
<= 0.23.0
Search vendor "Opensc Project" for product "Opensc" and version " <= 0.23.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
9.0
Search vendor "Redhat" for product "Enterprise Linux" and version "9.0"
-
Affected