Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12748: Allocation of Resources Without Limits or Throttling

0
Medium
VulnerabilityCVE-2025-12748cvecve-2025-12748
Published: Tue Nov 11 2025 (11/11/2025, 19:49:32 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.

AI-Powered Analysis

AILast updated: 11/18/2025, 20:19:47 UTC

Technical Analysis

CVE-2025-12748 is a vulnerability in libvirt, a widely used virtualization management tool, specifically affecting Red Hat Enterprise Linux 10. The issue arises because libvirt processes user-supplied XML files before performing Access Control List (ACL) checks. This sequence allows a malicious user with limited permissions to submit a specially crafted XML file that triggers libvirt to allocate excessive amounts of memory on the host system. The uncontrolled resource allocation can overwhelm system memory, causing the libvirt process to crash and resulting in a denial-of-service (DoS) condition. The vulnerability impacts the availability of the virtualization management service but does not compromise confidentiality or integrity. Exploitation requires local access with limited privileges but does not require user interaction. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the local attack vector, low complexity, required privileges, and the impact limited to availability. No public exploits have been reported yet. The flaw highlights a design weakness where input validation and ACL enforcement are not properly ordered, allowing resource exhaustion attacks. This vulnerability is particularly relevant for environments where multiple users have limited access to libvirt-managed resources, such as shared hosting or multi-tenant cloud platforms.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of virtualization infrastructure. Organizations using Red Hat Enterprise Linux 10 with libvirt for managing virtual machines could experience service disruptions if an attacker exploits this flaw to crash libvirt processes. This could lead to downtime of critical virtualized services, impacting business continuity and operational efficiency. Sectors relying heavily on virtualization, such as financial services, telecommunications, and cloud service providers, may face increased risk. Although the vulnerability does not expose sensitive data or allow unauthorized changes, the denial-of-service could indirectly affect service-level agreements and regulatory compliance, especially under GDPR requirements for availability and resilience. The requirement for local access limits the attack surface but does not eliminate risk in environments where multiple users or automated systems have limited privileges. The absence of known exploits reduces immediate risk but does not preclude future attacks.

Mitigation Recommendations

Organizations should prioritize applying official patches from Red Hat as soon as they become available to address this vulnerability. In the interim, administrators can restrict the ability to submit XML files to trusted users only and implement strict input validation or sandboxing mechanisms for XML processing. Monitoring memory usage and libvirt process stability can help detect early signs of exploitation attempts. Limiting the number of users with access to libvirt and enforcing the principle of least privilege reduces the risk of exploitation. Additionally, consider deploying resource limits (e.g., cgroups or systemd resource controls) on libvirt processes to prevent excessive memory consumption. Regularly auditing virtualization management configurations and access controls will help maintain a secure environment. Finally, organizations should prepare incident response plans for potential DoS events affecting virtualization infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-05T14:52:13.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6913946b553a74ed95f8eddc

Added to database: 11/11/2025, 7:54:19 PM

Last enriched: 11/18/2025, 8:19:47 PM

Last updated: 12/27/2025, 10:17:33 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats