Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12748: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2025-12748cvecve-2025-12748
Published: Tue Nov 11 2025 (11/11/2025, 19:49:32 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.

AI-Powered Analysis

AILast updated: 11/11/2025, 20:08:54 UTC

Technical Analysis

CVE-2025-12748 is a vulnerability identified in the libvirt virtualization management library used in Red Hat Enterprise Linux 10. The issue arises from the order of operations during XML file processing: libvirt parses user-supplied XML files before performing Access Control List (ACL) checks. This design flaw allows a malicious user with limited privileges to submit a specially crafted XML file that triggers excessive memory allocation on the host system. The uncontrolled resource consumption can cause the libvirt process to crash, resulting in a denial-of-service (DoS) condition that impacts the availability of virtualization services. The vulnerability does not compromise confidentiality or integrity, as it does not allow unauthorized data access or modification. Exploitation requires local access with at least limited privileges but does not require user interaction. No public exploits have been reported so far, and the vulnerability was published on November 11, 2025. The CVSS v3.1 score is 5.5 (medium), reflecting the moderate impact and attack complexity. The flaw is particularly relevant in environments where multiple users interact with libvirt-managed virtual machines, such as cloud or hosting providers, as it could be leveraged to disrupt services by exhausting host memory resources.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability of virtualization infrastructure managed by libvirt on Red Hat Enterprise Linux 10. Organizations relying on virtualized environments for critical workloads, including cloud service providers, data centers, and enterprises with multi-tenant setups, may experience service disruptions if an attacker exploits this flaw. The denial-of-service condition could lead to downtime, affecting business continuity and potentially causing financial losses or reputational damage. Since the exploit requires local access with limited privileges, insider threats or compromised accounts pose a higher risk. The vulnerability does not expose data confidentiality or integrity, but the interruption of virtualization services can impact dependent applications and services. Given the widespread use of Red Hat Enterprise Linux in European enterprises and public sector organizations, the impact could be significant if not mitigated promptly.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the XML parsing order and resource allocation controls in libvirt. 2. Restrict access to libvirt management interfaces and XML submission capabilities to trusted and authorized users only, minimizing the attack surface. 3. Implement strict user privilege management and auditing to detect and prevent unauthorized attempts to submit XML configurations. 4. Monitor system memory usage and libvirt process stability to detect abnormal resource consumption early, enabling rapid response to potential exploitation attempts. 5. Consider deploying resource limits or cgroups to constrain memory usage by libvirt processes, preventing excessive allocation from impacting the host system. 6. In multi-tenant environments, isolate user workloads and enforce strict access controls to reduce the risk of privilege escalation or misuse. 7. Educate system administrators and security teams about this vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-05T14:52:13.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6913946b553a74ed95f8eddc

Added to database: 11/11/2025, 7:54:19 PM

Last enriched: 11/11/2025, 8:08:54 PM

Last updated: 11/12/2025, 5:04:04 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats