Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13193: Incorrect Default Permissions

0
Medium
VulnerabilityCVE-2025-13193cvecve-2025-13193
Published: Mon Nov 17 2025 (11/17/2025, 17:03:48 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.

AI-Powered Analysis

AILast updated: 11/17/2025, 17:34:01 UTC

Technical Analysis

CVE-2025-13193 is a vulnerability identified in the libvirt virtualization management library used in Red Hat Enterprise Linux 10. The flaw stems from incorrect default file permissions assigned to external inactive snapshots of virtual machines that are shut down. Specifically, these snapshot files are created with world-readable permissions, allowing any local user on the host system to read the snapshot contents. Since snapshots contain the guest OS disk state, this exposure can lead to unauthorized disclosure of sensitive information stored within the guest VM, such as configuration files, credentials, or proprietary data. The vulnerability requires an attacker to have local access with at least low privileges on the host system but does not require any user interaction. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the high confidentiality impact but limited scope and attack vector (local). No known exploits have been reported in the wild, but the risk remains significant in multi-tenant or shared environments where unprivileged users coexist. The issue arises from libvirt's snapshot creation process failing to restrict permissions appropriately, which can be mitigated by adjusting file creation masks or patching libvirt to enforce stricter permissions. Organizations relying on Red Hat Enterprise Linux 10 for virtualization should audit snapshot permissions and apply vendor patches once available to prevent unauthorized data exposure.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. In environments where multiple users share physical hosts or where unprivileged users have local access, sensitive guest VM data could be exposed. This is particularly concerning for sectors handling sensitive or regulated data such as finance, healthcare, and government. The vulnerability does not affect integrity or availability, so operational disruption is unlikely. However, information disclosure could facilitate further attacks or data breaches. Organizations using Red Hat Enterprise Linux 10 with libvirt for virtualization, especially in cloud, hosting, or shared infrastructure contexts, are at risk. The impact is amplified in environments with weak host access controls or where snapshot files contain sensitive information. Since exploitation requires local access, organizations with strict physical and logical access controls will have reduced risk. Nonetheless, the potential for insider threats or compromised accounts means mitigation is critical.

Mitigation Recommendations

1. Immediately audit existing external inactive VM snapshot files on hosts running Red Hat Enterprise Linux 10 to verify and correct file permissions, ensuring they are not world-readable. 2. Restrict local user access on virtualization hosts to trusted administrators only, minimizing the number of users who can exploit this vulnerability. 3. Apply any available patches or updates from Red Hat addressing this libvirt permission issue as soon as they are released. 4. Configure libvirt or the underlying filesystem to enforce stricter default permissions (e.g., umask settings) for snapshot files to prevent world-readable creation. 5. Implement host-based access controls and monitoring to detect unauthorized access attempts to snapshot files. 6. Consider encrypting sensitive data within guest VMs to reduce the impact of potential snapshot exposure. 7. Review and harden virtualization host security policies, including user privilege management and audit logging. 8. For environments with multi-tenancy or shared hosts, isolate VMs and limit snapshot creation privileges to trusted roles. 9. Educate system administrators about the risks of improper snapshot permissions and best practices for managing VM snapshots securely.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-14T15:22:19.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b5a78903b8a3ddb6f53b0

Added to database: 11/17/2025, 5:25:12 PM

Last enriched: 11/17/2025, 5:34:01 PM

Last updated: 11/22/2025, 12:16:01 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats