Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-66004

Опубликовано: 10 дек. 2025
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.This issue affects usbmuxd: before 3ded00c9985a5108cfc7591a309f9a23d57a8cba.

A local path traversal vulnerability in usbmuxd allows unprivileged users to send crafted messages to its world-writable UNIX socket, causing the daemon to create or delete files as the usbmux user. Due to insufficient validation of the PairRecordID field, attackers can escape the intended configuration directory, with a narrow race condition potentially enabling broader file overwrite. The issue is limited to local access and does not directly grant root privileges.

Отчет

This issue is best classified as a Moderate vulnerability rather than an Important flaw because its impact is constrained to a local privilege boundary and a non-root service account. Exploitation requires local access to the system and interaction with a UNIX socket, with no remote attack vector or user interaction involved. While the lack of input validation allows path traversal leading to file deletion or creation, these operations are performed as the usbmux user, not as root, and therefore do not directly compromise full system integrity. The potential extension to arbitrary file overwrite relies on a tight race condition (TOCTOU), which reduces reliability and exploit consistency. There is no direct confidentiality impact and no automatic escalation beyond the service’s privilege scope, making the flaw security-relevant but limited in blast radius, aligning it with a medium (moderate) severity classification rather than a high-impact vulnerability.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6usbmuxdOut of support scope
Red Hat Enterprise Linux 7usbmuxdOut of support scope
Red Hat Enterprise Linux 8usbmuxdFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-35
https://bugzilla.redhat.com/show_bug.cgi?id=2420941usbmuxd: usbmuxd: Path Traversal vulnerability allows local privilege escalation

EPSS

Процентиль: 10%
0.00033
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
ubuntu
4 месяца назад

A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.This issue affects usbmuxd: before 3ded00c9985a5108cfc7591a309f9a23d57a8cba.

CVSS3: 5.7
nvd
4 месяца назад

A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.This issue affects usbmuxd: before 3ded00c9985a5108cfc7591a309f9a23d57a8cba.

CVSS3: 5.7
debian
4 месяца назад

A Path Traversal vulnerability in usbmuxd allows local users to escala ...

suse-cvrf
3 месяца назад

Security update for usbmuxd

suse-cvrf
4 месяца назад

Security update for usbmuxd

EPSS

Процентиль: 10%
0.00033
Низкий

5.7 Medium

CVSS3