CVE-2024-37408
📋 TL;DR
CVE-2024-37408 is an authentication bypass vulnerability in fprintd fingerprint authentication software. When configured with 'auth sufficient pam_fprintd.so' for sudo, it lacks a security attention mechanism, allowing unauthorized users to potentially execute privileged commands without proper fingerprint verification. This affects systems using fprintd with PAM configurations that rely on fingerprint authentication for sudo access.
💻 Affected Systems
- fprintd
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized local users gain full root privileges on affected systems, enabling complete system compromise, data theft, and persistence establishment.
Likely Case
Local attackers bypass fingerprint authentication to execute sudo commands with elevated privileges they shouldn't have access to.
If Mitigated
With proper PAM configuration restrictions, the vulnerability impact is limited as fingerprint authentication would only be allowed with proper attention mechanisms.
🎯 Exploit Status
Exploitation requires local access and knowledge of the vulnerable PAM configuration. Proof of concept details are publicly available in the OSS security mailing list references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://gitlab.freedesktop.org/libfprint/fprintd/-/releases
Restart Required: No
Instructions:
No software patch available. The vendor considers this a configuration issue. Update to latest fprintd version and modify PAM configuration as workaround.
🔧 Temporary Workarounds
Modify PAM Configuration
linuxRestrict pam_fprintd.so to only work with front-ends that implement proper security attention mechanisms
Edit /etc/pam.d/sudo or relevant PAM configuration files
Remove or modify 'auth sufficient pam_fprintd.so' lines
Consider using 'auth required' instead of 'auth sufficient' for pam_fprintd.so
Disable Fingerprint Authentication for Sudo
linuxTemporarily disable fingerprint authentication for sudo until proper configuration can be implemented
Comment out 'auth sufficient pam_fprintd.so' lines in PAM configuration files with #
🧯 If You Can't Patch
- Implement strict access controls and monitor sudo usage on affected systems
- Use multi-factor authentication for sudo instead of relying solely on fingerprint authentication
🔍 How to Verify
Check if Vulnerable:
Check PAM configuration files for 'auth sufficient pam_fprintd.so' entries, particularly in /etc/pam.d/sudo
Check Version:
fprintd --version or dpkg -l fprintd or rpm -q fprintd
Verify Fix Applied:
Verify that pam_fprintd.so is either removed from sudo PAM configuration or properly restricted to secure front-ends
📡 Detection & Monitoring
Log Indicators:
- Unexpected sudo authentications via fingerprint
- Multiple failed fingerprint attempts followed by successful sudo
Network Indicators:
- N/A - Local authentication bypass
SIEM Query:
sudo: pam_fprintd authentication events without corresponding security attention mechanism logs
🔗 References
- http://www.openwall.com/lists/oss-security/2024/06/13/3
- http://www.openwall.com/lists/oss-security/2024/06/14/1
- http://www.openwall.com/lists/oss-security/2024/06/14/2
- http://www.openwall.com/lists/oss-security/2024/06/14/3
- https://gitlab.freedesktop.org/libfprint/fprintd/-/releases
- https://lists.freedesktop.org/archives/fprint/2024-May/001231.html
- https://www.openwall.com/lists/oss-security/2024/05/30/3
- https://www.openwall.com/lists/oss-security/2024/06/13/2
- http://www.openwall.com/lists/oss-security/2024/06/13/3
- http://www.openwall.com/lists/oss-security/2024/06/14/1
- http://www.openwall.com/lists/oss-security/2024/06/14/2
- http://www.openwall.com/lists/oss-security/2024/06/14/3
- https://gitlab.freedesktop.org/libfprint/fprintd/-/releases
- https://lists.freedesktop.org/archives/fprint/2024-May/001231.html
- https://www.openwall.com/lists/oss-security/2024/05/30/3
- https://www.openwall.com/lists/oss-security/2024/06/13/2