Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13193: Incorrect Default Permissions

0
Medium
VulnerabilityCVE-2025-13193cvecve-2025-13193
Published: Mon Nov 17 2025 (11/17/2025, 17:03:48 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.

AI-Powered Analysis

AILast updated: 11/24/2025, 18:34:44 UTC

Technical Analysis

CVE-2025-13193 is a vulnerability identified in the libvirt virtualization management library, specifically affecting Red Hat Enterprise Linux 10. The issue stems from the incorrect default permissions assigned to external inactive snapshots of virtual machines that are shut down. These snapshots are created with world-readable permissions, meaning any user on the host system, including unprivileged users, can read the snapshot files. Since these snapshots contain the guest OS disk state, this misconfiguration leads to an information disclosure vulnerability. The vulnerability does not require user interaction and can be exploited by a local attacker with low privileges, making it relatively easy to exploit once local access is obtained. The CVSS 3.1 base score is 5.5, reflecting a medium severity primarily due to the impact on confidentiality without affecting integrity or availability. No known exploits have been reported in the wild yet. The vulnerability highlights a security oversight in default file permission settings within libvirt's snapshot handling, which could expose sensitive guest OS data such as configuration files, credentials, or other private information stored within the VM disk images. This flaw is particularly concerning in multi-tenant or shared environments where multiple users have local access to the host system. The vulnerability was publicly disclosed on November 17, 2025, and is assigned to Red Hat as the vendor project. While no patches or exploit code are currently linked, organizations using affected versions should proactively address the issue to prevent potential data leaks.

Potential Impact

For European organizations, the primary impact of CVE-2025-13193 is unauthorized information disclosure from virtual machine snapshots. This can lead to exposure of sensitive data such as credentials, proprietary information, or personal data stored within guest VMs. In sectors like finance, healthcare, and government, such leaks could result in regulatory non-compliance, reputational damage, and potential legal consequences under GDPR. Since the vulnerability requires local access, the risk is elevated in environments with multiple users or insufficient host access controls, such as shared hosting providers or large enterprises with many administrators. The flaw does not affect system integrity or availability, so direct system compromise or denial of service is unlikely. However, the confidentiality breach could be leveraged as a stepping stone for further attacks if sensitive information is extracted. European organizations relying heavily on Red Hat Enterprise Linux 10 and libvirt for virtualization infrastructure are at risk, especially those with complex multi-user environments or less stringent host access policies.

Mitigation Recommendations

To mitigate CVE-2025-13193, organizations should first apply any official patches or updates from Red Hat as soon as they become available. In the absence of patches, administrators should audit the permissions of external inactive snapshot files created by libvirt and manually restrict them to owner-only access (e.g., chmod 600). Implement strict host access controls to limit which users have local access to systems running libvirt, reducing the attack surface. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce additional restrictions on snapshot file access. Regularly monitor and log access to snapshot files to detect any unauthorized attempts. Additionally, consider encrypting VM disk images and snapshots to protect data at rest. Review and update virtualization security policies to ensure that snapshot management follows the principle of least privilege. Finally, educate system administrators about the risks of improper file permissions in virtualization environments to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-14T15:22:19.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b5a78903b8a3ddb6f53b0

Added to database: 11/17/2025, 5:25:12 PM

Last enriched: 11/24/2025, 6:34:44 PM

Last updated: 1/7/2026, 8:54:57 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats