The vulnerability allows a malicious low-privileged PAM user to access information about other PAM users and their group memberships.
Weakness
The product stores sensitive information without properly limiting read or write access by unauthorized actors.
References