{"id":"CVE-2011-4120","details":"Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question by providing a NULL value (pressing Ctrl-D keyboard sequence) as the password string.","modified":"2026-01-27T04:12:55.246687Z","published":"2019-11-26T05:15:13Z","withdrawn":"2026-01-27T04:12:55.246687Z","references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/cve-2011-4120"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4120"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2011-4120"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2011/11/07/6"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}