
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
pamkrb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. The vulnerability (CVE-2023-3326) was discovered in June 2023 and affects systems using pamkrb5 for authentication without a provisioned keytab. The issue impacts various operating systems including FreeBSD and NetBSD, though Linux systems are not believed to be affected (FreeBSD Advisory, OSS Security).
The vulnerability stems from pamkrb5's authentication process where it obtains a ticket-granting ticket from the KDC over the network. Without a keytab provisioned on the system, pamkrb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).
In affected systems, an attacker who can control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system. This could lead to unauthorized access, disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS) (FreeBSD Advisory, NetApp Advisory).
Several mitigation strategies are available: 1) For systems not using Kerberos, ensure /etc/krb5.conf is missing and pamkrb5 is commented out of the PAM configuration. 2) For systems using Kerberos but not pamkrb5, ensure pamkrb5 is commented out of the PAM configuration. 3) For systems using pamkrb5, ensure a keytab is provisioned on the system as provided by the Kerberos administrator (FreeBSD Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”