Vulnerability Management, Identity, Privileged access management![Adobe Stock](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/10/AdobeStock_506866381.jpg)
Evading 2FA possible with Yubico software module bug
![Adobe Stock](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2024/10/AdobeStock_506866381.jpg)
Adobe Stock
Major hardware authentication security key provider Yubico has warned of a high-severity security issue impacting its pam-u2f software package for Yubikey and FIDO-compliant device integration, tracked as CVE-2025-23013, which could be exploited to facilitate partial evasion of two-factor authentication defenses in macOS and Linux devices, The Cyber Express reports. Such a vulnerability — which stems from inadequate authentication flow management within the pam_sm_authenticate() function — is slightly more severe in configurations involving single-factor authentication with user-managed AuthFile, as well as the utilization of pam-u2f for single-factor authentication with other Pluggable Authentication Modules, compared with scenarios involving 2FA with a centrally managed AuthFile, according to Yubico. Organizations running pam-u2f prior to 1.3.1, especially those that used apt or manual means for pam-u2f installation in macOS and Linux systems, have been urged to immediately download the latest version of the software module to avoid potential compromise.
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds