The vulnerability allows an attacker to bypass the authentication requirements for a specific PAM endpoint.CreditsAbdel Adim `smaury` Oisfi of Shielder (https://www.shielder.com) - research@shielder.comPaolo Cavaglià of Shielder (https://www.shielder.com) - research@shielder.comReferenceshttps://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678