Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12801: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2025-12801cvecve-2025-12801
Published: Wed Mar 04 2026 (03/04/2026, 15:25:53 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:25:46 UTC

Technical Analysis

CVE-2025-12801 is a vulnerability discovered in the rpc.mountd daemon within the nfs-utils package on Red Hat Enterprise Linux 10. The issue arises from incorrect execution-assigned permissions during the NFSv3 mount process. Normally, the /etc/exports file governs which directories are exported over NFS and enforces access controls such as file permissions and squash options like root_squash or all_squash to restrict client privileges. However, this vulnerability allows an NFSv3 client to bypass these restrictions at mount time, granting access to any subdirectory or subtree within the exported directory regardless of the configured permissions or squash settings. This means that a client can escalate its privileges beyond what the server administrator intended, potentially accessing sensitive data that should have been restricted. The vulnerability requires network access (AV:N) and low attack complexity (AC:L), with the attacker needing some privileges (PR:L) but no user interaction (UI:N). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. The vulnerability is rated medium severity with a CVSS 3.1 score of 6.5. No known exploits are currently in the wild, but the flaw poses a significant risk to environments using NFSv3 exports on RHEL 10. The issue highlights a critical misconfiguration or coding error in the mount daemon that undermines the security model of NFS exports.

Potential Impact

The primary impact of CVE-2025-12801 is unauthorized data disclosure. Attackers exploiting this vulnerability can access sensitive files and directories that should be restricted by export permissions and squash options. This can lead to leakage of confidential information, intellectual property, or personally identifiable information. Since the vulnerability does not affect integrity or availability, it does not allow modification or disruption of services directly. However, unauthorized access can facilitate further attacks such as data exfiltration or lateral movement within a network. Organizations relying on NFSv3 for file sharing, especially in multi-tenant or sensitive environments, face increased risk of data breaches. The vulnerability could undermine trust in NFS exports and complicate compliance with data protection regulations. Although no public exploits are known yet, the low complexity and network accessibility make it a credible threat once exploited. The scope is limited to systems running Red Hat Enterprise Linux 10 with vulnerable nfs-utils and configured NFSv3 exports.

Mitigation Recommendations

To mitigate CVE-2025-12801, organizations should: 1) Apply vendor patches immediately once available to fix the rpc.mountd daemon vulnerability. 2) Temporarily disable NFSv3 exports or restrict NFS access to trusted clients only via firewall rules and network segmentation. 3) Review and tighten /etc/exports configurations, minimizing exported directories and avoiding broad subtree exports. 4) Consider upgrading to NFSv4 or later versions which have improved security features and are not affected by this issue. 5) Monitor NFS server logs for unusual mount requests or access patterns indicative of exploitation attempts. 6) Implement intrusion detection systems to alert on anomalous NFS traffic. 7) Educate system administrators on the risks of exporting directories with weak permissions or squash settings. 8) Conduct regular audits of NFS export permissions and client access rights. These steps go beyond generic advice by focusing on configuration hardening, network controls, and proactive monitoring specific to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-06T12:17:26.749Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a850c1d1a09e29cb458b4a

Added to database: 3/4/2026, 3:33:21 PM

Last enriched: 4/3/2026, 3:25:46 AM

Last updated: 4/19/2026, 10:54:34 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses