The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-24032

CVE-2025-24032: PAM-PKCS#11 Auth Bypass Vulnerability

CVE-2025-24032 is an authentication bypass flaw in PAM-PKCS#11 that allows attackers to login using cloned tokens without private key verification. This article covers the technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-24032 Overview

CVE-2025-24032 is a critical authentication bypass vulnerability in PAM-PKCS#11, a Linux-PAM login module that enables X.509 certificate-based user authentication. When the cert_policy configuration is set to none (the default value), the module only verifies that a user can log into a token without requiring a cryptographic signature from the private key. This fundamental flaw allows attackers to forge tokens containing a user's public certificate data and authenticate as that user using a PIN they control.

Critical Impact

Attackers can impersonate legitimate users by creating counterfeit tokens with copied public certificate data, completely bypassing authentication controls on systems using the default PAM-PKCS#11 configuration.

Affected Products

  • PAM-PKCS#11 versions 0.6.0 through 0.6.12
  • Linux systems using PAM-PKCS#11 with default cert_policy = none configuration
  • Any deployment relying on X.509 certificate-based authentication via PAM-PKCS#11

Discovery Timeline

  • February 4, 2025 - Version 0.6.13 released with security fix
  • February 10, 2025 - CVE-2025-24032 published to NVD
  • May 21, 2025 - Last updated in NVD database

Technical Details for CVE-2025-24032

Vulnerability Analysis

This vulnerability stems from an insecure default configuration in PAM-PKCS#11's certificate verification policy. The module's authentication mechanism was designed to verify that a user possesses a valid token, but when cert_policy is set to none, it fails to cryptographically prove possession of the corresponding private key. This allows an attacker who has access to a user's public certificate (which is often publicly available or easily obtained) to create a cloned token that passes authentication checks.

The vulnerability affects all versions from pam_pkcs11-0.6.0 onwards, introduced by commit 6638576892b59a99389043c90a1e7dd4d783b921, which changed the default behavior to skip private key signature verification. The CWE classification is CWE-287 (Improper Authentication), accurately reflecting the core issue of failing to properly authenticate users through cryptographic proof of identity.

Root Cause

The root cause is the default cert_policy = none configuration that bypasses signature verification. In this state, PAM-PKCS#11 only checks whether a user can successfully authenticate to a token (e.g., by entering a correct PIN), but does not require the token to prove possession of the private key by generating a cryptographic signature. Since public certificates and their associated data are inherently public, this design allows anyone with access to a user's certificate to create a fraudulent token.

The fix inverts the logic from signature_policy to no_signature_policy, making signature verification the default behavior:

c
 struct cert_policy_st {
 	int ca_policy;
 	int crl_policy;
-	int signature_policy;
+	int no_signature_policy;
 	const char *ca_dir;
 	const char *crl_dir;
 	const char *nss_dir;

Source: OpenSC Commit Update

Attack Vector

The attack vector is network-based and requires the attacker to have physical or logical access to a system's authentication interface. The attack proceeds as follows:

  1. The attacker obtains the target user's public X.509 certificate (often publicly available)
  2. The attacker creates a new PKCS#11 token populated with the user's public certificate data
  3. The attacker sets a PIN of their choosing on the fraudulent token
  4. When authenticating, the attacker presents the forged token and enters their known PIN
  5. PAM-PKCS#11 (with default configuration) accepts the authentication without verifying private key possession

The configuration update clarifies the new secure default behavior:

text
     support_threads = false;

     # Sets the Certificate verification policy. 
-    # "none"        Performs no verification
+    # "none"        Performs no verification, except (!) the signature
     # "ca"          Does CA check
     # "crl_online"  Downloads the CRL form the location given by the
     #               CRL distribution point extension of the certificate

Source: OpenSC Commit Update

Detection Methods for CVE-2025-24032

Indicators of Compromise

  • Successful PAM authentication events from unrecognized or unexpected hardware tokens
  • Authentication attempts using tokens with serial numbers not registered in organizational inventory
  • Multiple authentication attempts from different tokens claiming the same user identity
  • Log entries showing successful logins without corresponding smart card insertion events on legitimate workstations

Detection Strategies

  • Review PAM-PKCS#11 configuration files (pam_pkcs11.conf) to verify cert_policy includes signature requirement
  • Monitor authentication logs for anomalous token-based login patterns
  • Implement hardware token inventory management and alert on unregistered token usage
  • Deploy endpoint detection to correlate physical smart card reader events with authentication attempts

Monitoring Recommendations

  • Enable verbose logging in PAM-PKCS#11 by setting appropriate debug levels
  • Centralize and correlate authentication logs across all systems using certificate-based authentication
  • Establish baselines for normal token usage patterns and alert on deviations
  • Audit user certificate repositories for unauthorized access or extraction attempts

How to Mitigate CVE-2025-24032

Immediate Actions Required

  • Update PAM-PKCS#11 to version 0.6.13 or later immediately
  • If update is not immediately possible, apply the configuration workaround by setting cert_policy = signature; in pam_pkcs11.conf
  • Audit all systems using PAM-PKCS#11 for certificate-based authentication to identify affected deployments
  • Review recent authentication logs for any suspicious token-based login activity

Patch Information

The vulnerability is resolved in PAM-PKCS#11 version 0.6.13, released on February 4, 2025. The fix changes the default behavior to require signature verification, ensuring that authentication requires cryptographic proof of private key possession. Multiple commits address this vulnerability, including fixes to the core verification logic and configuration file updates.

For detailed patch information, see the OpenSC Release Tag 0.6.13 and the GitHub Security Advisory GHSA-8r8p-7mgp-vf56. Debian users should refer to the Debian LTS Announcement for distribution-specific updates.

Workarounds

  • Set cert_policy = signature; in pam_pkcs11.conf to enforce signature verification
  • Consider implementing additional authentication factors while awaiting patching
  • Restrict physical access to systems using certificate-based authentication
  • Monitor for unauthorized token creation or certificate extraction attempts
bash
# Configuration example - Mitigation in pam_pkcs11.conf
# Edit /etc/pam_pkcs11/pam_pkcs11.conf
# Locate the cert_policy directive and modify as follows:

# Change from:
# cert_policy = none;

# To require signature verification:
cert_policy = signature;

# For additional security, combine with CA verification:
# cert_policy = ca,signature;

# Restart PAM services after configuration change
systemctl restart sshd  # If using SSH with PAM

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechPam Pkcs11

  • SeverityCRITICAL

  • CVSS Score9.2

  • EPSS Probability0.44%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-287
  • Technical References
  • OpenSC Commit Update

  • OpenSC Commit Update

  • OpenSC Commit Update

  • OpenSC Release Tag 0.6.13

  • GitHub Security Advisory GHSA-8r8p-7mgp-vf56

  • Debian LTS Announcement

  • Vicarius Blog Detection Guide

  • Vicarius Blog Mitigation Guide
  • Latest CVEs
  • CVE-2026-40322: SiYuan Knowledge Management RCE Vulnerability

  • CVE-2026-40318: SiYuan Path Traversal Vulnerability

  • CVE-2026-40259: SiYuan Auth Bypass Vulnerability

  • CVE-2026-40255: AdonisJS HTTP Server CSRF Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English