Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4168-1 | openafs security update |
Debian DSA |
DSA-5842-1 | openafs security update |
EUVD |
EUVD-2024-33418 | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG. |
Tue, 23 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-190 | |
| References |
|
Tue, 23 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG. | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG. |
| Title | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client | Theft of credentials in Unix client PAGs |
| Weaknesses | CWE-305 | |
| References |
|
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 07 Aug 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:* cpe:2.3:a:openafs:openafs:1.9.0:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 19 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 14 Nov 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG. | |
| Title | A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2025-12-23T15:22:39.503Z
Reserved: 2024-10-25T18:51:34.290Z
Link: CVE-2024-10394
Updated: 2025-11-03T19:29:07.636Z
Status : Modified
Published: 2024-11-14T20:15:20.777
Modified: 2025-12-23T16:16:20.870
Link: CVE-2024-10394
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:21Z
Debian DLA
Debian DSA
EUVD