← Back to CVEs
CVE-2024-10394
HIGH7.8
Description
A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published11/14/2024
Last Modified12/23/2025
Sourcenvd
Honeypot Sightings0
Affected Products
openafs:openafs
Weaknesses (CWE)
CWE-305
References
https://www.openafs.org/pages/security/OPENAFS-SA-2024-001.txt(patrick@puiterwijk.org)
https://www.openafs.org/security(patrick@puiterwijk.org)
https://lists.debian.org/debian-lts-announce/2025/05/msg00019.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.