| ID |
CVE-2025-57848
|
| Sažetak |
A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
| Reference |
|
| CVSS |
| Base: | 5.2 |
| Impact: | 4.7 |
| Exploitability: | 0.5 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
HIGH |
HIGH |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
HIGH |
LOW |
|
| CVSS vektor |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L |
| Zadnje važnije ažuriranje |
27-10-2025 - 13:20 |
| Objavljeno |
23-10-2025 - 20:15 |