Identity

Attackers Can Evade 2FA with Yubico Software Module Bug

Attackers can evade 2FA with a Yubico software module bug. (Yubico)

Hardware authentication security key provider Yubico has warned of a high-severity issue impacting its pam-u2f software package for Yubikey and FIDO-compliant device integration, which could be exploited to facilitate partial evasion of two-factor authentication defenses in macOS and Linux devices, The Cyber Express reports.

Yubico said the vulnerability — tracked as CVE-2025-23013 -- stems from inadequate authentication flow management within the pam_sm_authenticate() function. The company said it's slightly more severe in configurations involving single-factor authentication with user-managed AuthFile, as well as the utilization of pam-u2f for single-factor authentication with other Pluggable Authentication Modules, compared with scenarios involving 2FA with a centrally-managed AuthFile.

Organizations running pam-u2f prior to 1.3.1, especially those that used apt or manual means for pam-u2f installation in macOS and Linux systems, have been urged to immediately download the latest version of the software module to avoid potential compromise.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.