PT-2026-3885 · Unknown · Opencryptoki

Pavelkohout396

·

Published

2026-01-22

·

Updated

2026-02-20

·

CVE-2026-23893

CVSS v3.1
6.8
VectorAV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
Name of the Vulnerable Software and Affected Versions openCryptoki versions 2.3.2 and above
Description openCryptoki is a PKCS#11 library used on Linux and AIX systems. Versions 2.3.2 and above are susceptible to symlink-following when operating in privileged contexts. A user belonging to the token-group can redirect file operations to arbitrary filesystem locations by creating symlinks within group-writable token directories, potentially leading to privilege escalation or data exposure. The token and lock directories are configured with 0770 permissions, allowing any token-group member to place files and symlinks inside them. When executed with root privileges, the base code responsible for handling token directory file access, along with several openCryptoki tools used for administrative tasks, may modify the ownership or permissions of existing files within these token directories. An attacker with token-group membership can exploit this issue when an administrator runs a PKCS#11 application or administrative tool that performs
chown
operations on files inside the token directory during routine maintenance.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

LPE

Link Following

Weakness Enumeration

Related Identifiers

CVE-2026-23893
GHSA-J6C7-MVPX-JX5Q
OESA-2026-1257
OESA-2026-1258
OESA-2026-1320
OESA-2026-1321
SUSE-SU-2026:0481-1

Affected Products

Opencryptoki