CVE-2023-3326
Linux Debian vulnerability analysis and mitigation

Overview

pamkrb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. The vulnerability (CVE-2023-3326) was discovered in June 2023 and affects systems using pamkrb5 for authentication without a provisioned keytab. The issue impacts various operating systems including FreeBSD and NetBSD, though Linux systems are not believed to be affected (FreeBSD Advisory, OSS Security).

Technical details

The vulnerability stems from pamkrb5's authentication process where it obtains a ticket-granting ticket from the KDC over the network. Without a keytab provisioned on the system, pamkrb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).

Impact

In affected systems, an attacker who can control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system. This could lead to unauthorized access, disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (FreeBSD Advisory, NetApp Advisory).

Mitigation and workarounds

Several mitigation strategies are available: 1) For systems not using Kerberos, ensure /etc/krb5.conf is missing and pamkrb5 is commented out of the PAM configuration. 2) For systems using Kerberos but not pamkrb5, ensure pamkrb5 is commented out of the PAM configuration. 3) For systems using pamkrb5, ensure a keytab is provisioned on the system as provided by the Kerberos administrator (FreeBSD Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management