Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10041: Insecure Storage of Sensitive Information

0
Medium
VulnerabilityCVE-2024-10041cvecve-2024-10041
Published: Wed Oct 23 2024 (10/23/2024, 13:46:27 UTC)
Source: CVE Database V5

Description

A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:14:07 UTC

Technical Analysis

CVE-2024-10041 is a vulnerability identified in PAM version 1.6.0 that stems from insecure handling and storage of sensitive information in memory during authentication operations. Specifically, secret data such as passwords from /etc/shadow are stored in memory in a manner that can be exploited through speculative execution attacks. An attacker with low privileges and local access can send crafted input to the victim program's standard input (stdin), triggering the program to execute code paths that allow training of the CPU's branch predictor. This enables the attacker to execute a Return-Oriented Programming (ROP) chain speculatively, bypassing normal security boundaries and leaking sensitive information from memory. The vulnerability is classified under CWE-922, which relates to improper restriction of speculative execution. The CVSS v3.1 score is 4.7 (medium severity), reflecting the requirement for local access, high attack complexity, and no user interaction. Although no public exploits are reported, the potential for leaking authentication secrets poses a significant confidentiality risk. This vulnerability affects systems running PAM 1.6.0, a critical component in many Unix-like operating systems for authentication management. The flaw highlights the intersection of software design and modern CPU speculative execution vulnerabilities, requiring careful mitigation to prevent credential exposure.

Potential Impact

The primary impact of CVE-2024-10041 is the potential unauthorized disclosure of highly sensitive authentication credentials, including passwords stored in /etc/shadow. If exploited, attackers could gain access to password hashes or plaintext secrets, which could then be used for privilege escalation, lateral movement, or persistent access within an organization’s network. This compromises the confidentiality of user credentials and undermines the integrity of authentication mechanisms. Although the vulnerability does not directly affect system availability or integrity, the leaked credentials could facilitate further attacks that do. The requirement for local access and high attack complexity limits the scope somewhat, but insider threats or attackers who have already gained limited access could leverage this vulnerability to escalate privileges. Organizations relying on PAM 1.6.0 in critical infrastructure, cloud environments, or enterprise Linux servers face increased risk of credential theft and subsequent compromise of sensitive systems.

Mitigation Recommendations

To mitigate CVE-2024-10041, organizations should: 1) Immediately restrict local access to systems running PAM 1.6.0, limiting user permissions and monitoring for unusual stdin activity that could indicate exploitation attempts. 2) Implement strict access controls and audit logging to detect suspicious behavior related to authentication processes. 3) Apply any available patches or updates from PAM maintainers as soon as they are released, as the current information indicates no patch links but updates are expected. 4) Consider deploying runtime protections or CPU microcode updates that mitigate speculative execution attacks, such as Spectre mitigations, to reduce the risk of branch predictor manipulation. 5) Use multi-factor authentication to reduce reliance on password secrecy alone. 6) Conduct regular security assessments and penetration tests focusing on local privilege escalation vectors. 7) Educate system administrators about the risks of speculative execution vulnerabilities and the importance of timely patching and monitoring.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-16T16:13:54.632Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5c4ee672cd9080e8d495

Added to database: 11/20/2025, 6:22:06 PM

Last enriched: 2/28/2026, 11:14:07 AM

Last updated: 3/24/2026, 2:50:59 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses