Modified
Published: 06 Feb 2019, 20:00
Last modified:04 Aug 2024, 19:19

Vulnerability Summary

Overall Risk (default)
medium
38/100
CVSS Score
6.9 MEDIUM
v2.0 (nvd)
EPSS Score
0.07% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected

Timeline

06 Feb 2019, 20:00
Published
Vulnerability first disclosed
04 Aug 2024, 19:19
Last Modified
Vulnerability information updated

Description

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.

CVSS Metrics

  • v3.0MEDIUMScore: 6.3CVSS:3.0/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  • v3.0MEDIUMScore: 6.4CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • v2.0MEDIUMScore: 6.9AV:L/AC:M/Au:N/C:C/I:C/A:C

EPSS Trends

Current EPSS score: 0.07% Percentile: 23%

Techniques & Countermeasures

  • CWE-287Improper Authentication

    When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Systems

  • canonicalubuntu_linux

    18.04 | 18.10

  • gnomegnome_display_manager

    < 3.31.4

  • redhatenterprise_linux

    7.0

  • the gnome projectrgdm

    3.31.4

References (2)