Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-3737 | A malicious actor can fix the session of a PAM user by tricking the user to click on a specially crafted link to the PAM server. |
Wed, 05 Feb 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 05 Feb 2025 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 30 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-384 | |
| Metrics |
ssvc
|
Thu, 30 Jan 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious actor can fix the session of a PAM user by tricking the user to click on a specially crafted link to the PAM server. | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: symantec
Published:
Updated: 2025-02-05T04:51:10.380Z
Reserved: 2025-01-22T08:29:34.305Z
Link: CVE-2025-24503
Updated: 2025-01-30T19:22:03.497Z
Status : Deferred
Published: 2025-01-30T19:15:16.453
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-24503
No data.
OpenCVE Enrichment
No data.
EUVD