CVE-2025-13193: Incorrect Default Permissions
A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
AI Analysis
Technical Summary
CVE-2025-13193 is a vulnerability discovered in libvirt, a virtualization management library commonly used in Red Hat Enterprise Linux 10 environments. The issue arises when external inactive snapshots of virtual machines that are shut down are created with incorrect default permissions, specifically world-readable access. This means that any local unprivileged user on the host system can read the snapshot files, which contain the guest OS disk state and potentially sensitive information stored within the VM. The vulnerability does not affect running VMs or active snapshots but targets inactive snapshots that remain on disk. The flaw is due to improper permission settings during snapshot creation, violating the principle of least privilege. The CVSS 3.1 score of 5.5 reflects a medium severity, with an attack vector requiring local access and low complexity, but no user interaction is needed. The impact is limited to confidentiality as integrity and availability are not affected. No known public exploits have been reported yet, but the exposure of guest OS contents could lead to data leakage or further attacks if sensitive credentials or information are obtained. The vulnerability is specific to Red Hat Enterprise Linux 10 using libvirt, and mitigation involves correcting snapshot file permissions and applying vendor patches once available.
Potential Impact
The primary impact of CVE-2025-13193 is unauthorized information disclosure. Unprivileged local users can access sensitive data from guest VMs by reading snapshot files that should be restricted. This can lead to exposure of confidential information such as credentials, proprietary data, or personally identifiable information stored within the virtual machines. While the vulnerability does not allow modification or disruption of services, the confidentiality breach can facilitate further attacks, including privilege escalation or lateral movement within an organization’s infrastructure. Organizations relying heavily on virtualization with libvirt on Red Hat Enterprise Linux 10 are at risk, especially those with multi-tenant environments or shared hosting where multiple users have local access. The medium severity rating reflects a moderate risk that requires attention but is not immediately critical. The lack of known exploits reduces immediate urgency but does not eliminate the threat, as attackers could develop exploits given the information disclosed.
Mitigation Recommendations
To mitigate CVE-2025-13193, organizations should first verify and correct the permissions of existing external inactive snapshot files to ensure they are not world-readable. This can be done by setting restrictive file permissions (e.g., 0600 or 0640) limiting access to authorized users only. Administrators should monitor and audit snapshot creation processes to detect any improper permission settings. Applying official patches or updates from Red Hat as soon as they are released is critical to address the root cause in libvirt. Additionally, organizations should enforce strict access controls on hosts running libvirt, limiting local user accounts and their privileges to reduce the attack surface. Implementing file integrity monitoring on snapshot directories can alert administrators to unauthorized permission changes. Finally, educating system administrators about secure snapshot management and regularly reviewing virtualization security policies will help prevent similar issues.
Affected Countries
United States, Germany, Japan, India, United Kingdom, France, Canada, Australia, South Korea, Brazil
CVE-2025-13193: Incorrect Default Permissions
Description
A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13193 is a vulnerability discovered in libvirt, a virtualization management library commonly used in Red Hat Enterprise Linux 10 environments. The issue arises when external inactive snapshots of virtual machines that are shut down are created with incorrect default permissions, specifically world-readable access. This means that any local unprivileged user on the host system can read the snapshot files, which contain the guest OS disk state and potentially sensitive information stored within the VM. The vulnerability does not affect running VMs or active snapshots but targets inactive snapshots that remain on disk. The flaw is due to improper permission settings during snapshot creation, violating the principle of least privilege. The CVSS 3.1 score of 5.5 reflects a medium severity, with an attack vector requiring local access and low complexity, but no user interaction is needed. The impact is limited to confidentiality as integrity and availability are not affected. No known public exploits have been reported yet, but the exposure of guest OS contents could lead to data leakage or further attacks if sensitive credentials or information are obtained. The vulnerability is specific to Red Hat Enterprise Linux 10 using libvirt, and mitigation involves correcting snapshot file permissions and applying vendor patches once available.
Potential Impact
The primary impact of CVE-2025-13193 is unauthorized information disclosure. Unprivileged local users can access sensitive data from guest VMs by reading snapshot files that should be restricted. This can lead to exposure of confidential information such as credentials, proprietary data, or personally identifiable information stored within the virtual machines. While the vulnerability does not allow modification or disruption of services, the confidentiality breach can facilitate further attacks, including privilege escalation or lateral movement within an organization’s infrastructure. Organizations relying heavily on virtualization with libvirt on Red Hat Enterprise Linux 10 are at risk, especially those with multi-tenant environments or shared hosting where multiple users have local access. The medium severity rating reflects a moderate risk that requires attention but is not immediately critical. The lack of known exploits reduces immediate urgency but does not eliminate the threat, as attackers could develop exploits given the information disclosed.
Mitigation Recommendations
To mitigate CVE-2025-13193, organizations should first verify and correct the permissions of existing external inactive snapshot files to ensure they are not world-readable. This can be done by setting restrictive file permissions (e.g., 0600 or 0640) limiting access to authorized users only. Administrators should monitor and audit snapshot creation processes to detect any improper permission settings. Applying official patches or updates from Red Hat as soon as they are released is critical to address the root cause in libvirt. Additionally, organizations should enforce strict access controls on hosts running libvirt, limiting local user accounts and their privileges to reduce the attack surface. Implementing file integrity monitoring on snapshot directories can alert administrators to unauthorized permission changes. Finally, educating system administrators about secure snapshot management and regularly reviewing virtualization security policies will help prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat
- Date Reserved
- 2025-11-14T15:22:19.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691b5a78903b8a3ddb6f53b0
Added to database: 11/17/2025, 5:25:12 PM
Last enriched: 2/27/2026, 9:36:29 AM
Last updated: 3/22/2026, 9:15:22 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.