Overview
- Description
- A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
- Source
- secalert@redhat.com
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.4
- Impact score
- 5.2
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- HIGH
Weaknesses
- secalert@redhat.com
- CWE-287
Social media
- Hype score
- Not currently trending
🚨 CVE-2024-10963 (Published: 2024-11-07) - A moderate vulnerability in Red Hat Nan affects specific versions. Users are advised to update to the latest patched versions to mitigate risks. For detailed remediation steps, visit: https://t.co/yKjI4roP9i #CyberSecurity #RedHat
@transilienceai
11 Nov 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10963 (Published: 2024-11-07) - A moderate vulnerability in Red Hat Nan affects specific versions. Users are urged to update to the latest release to mitigate risks. For detailed remediation steps, visit: https://t.co/yKjI4roP9i #CyberSecurity #RedHat… https://t.co/Sp
@transilienceai
11 Nov 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10963 Hostname Spoofing Vulnerability in pam_access Undermines Local Access Co... https://t.co/A81gcsAMme Vulnerability Notification: https://t.co/xhLrNnfyrO
@VulmonFeeds
7 Nov 2024
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes