Pluggable authentication modules (PAM) allow for a modular approach to integrating authentication methods. PAM operates in a top-down processing model and if the modules are not listed in the correct order, an important security function could be bypassed if stack entries are not centralized.
Check
Verify that /etc/pam.d/passwd is configured to use /etc/pam.d/system-auth when changing passwords: