Overview
- Description
- A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
- Source
- patrick@puiterwijk.org
- NVD status
- Awaiting Analysis
Risk scores
CVSS 4.0
- Type
- Secondary
- Base score
- 8.4
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
Weaknesses
- patrick@puiterwijk.org
- CWE-190
Social media
- Hype score
- Not currently trending
CVE-2024-10394 OpenAFS PAG Credentials Hijack via Throttling Bypass on Unix In Unix clients, a local user can bypass the OpenAFS PAG throttling mechanism. This lets the user create a PAG using an existing id numb... https://t.co/B1oV93m02v
@VulmonFeeds
14 Nov 2024
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-10394: HIGH] Potential security breach in Unix clients: Attackers can bypass OpenAFS PAG throttling allowing theft of credentials. Ensure robust cyber defense measures are in place.#cybersecurity,#vulnerability https://t.co/3BjbvOf5tY https://t.co/iuWW8ygOqG
@CveFindCom
14 Nov 2024
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes