Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13193: Incorrect Default Permissions

0
Medium
VulnerabilityCVE-2025-13193cvecve-2025-13193
Published: Mon Nov 17 2025 (11/17/2025, 17:03:48 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:36:29 UTC

Technical Analysis

CVE-2025-13193 is a vulnerability discovered in libvirt, a virtualization management library commonly used in Red Hat Enterprise Linux 10 environments. The issue arises when external inactive snapshots of virtual machines that are shut down are created with incorrect default permissions, specifically world-readable access. This means that any local unprivileged user on the host system can read the snapshot files, which contain the guest OS disk state and potentially sensitive information stored within the VM. The vulnerability does not affect running VMs or active snapshots but targets inactive snapshots that remain on disk. The flaw is due to improper permission settings during snapshot creation, violating the principle of least privilege. The CVSS 3.1 score of 5.5 reflects a medium severity, with an attack vector requiring local access and low complexity, but no user interaction is needed. The impact is limited to confidentiality as integrity and availability are not affected. No known public exploits have been reported yet, but the exposure of guest OS contents could lead to data leakage or further attacks if sensitive credentials or information are obtained. The vulnerability is specific to Red Hat Enterprise Linux 10 using libvirt, and mitigation involves correcting snapshot file permissions and applying vendor patches once available.

Potential Impact

The primary impact of CVE-2025-13193 is unauthorized information disclosure. Unprivileged local users can access sensitive data from guest VMs by reading snapshot files that should be restricted. This can lead to exposure of confidential information such as credentials, proprietary data, or personally identifiable information stored within the virtual machines. While the vulnerability does not allow modification or disruption of services, the confidentiality breach can facilitate further attacks, including privilege escalation or lateral movement within an organization’s infrastructure. Organizations relying heavily on virtualization with libvirt on Red Hat Enterprise Linux 10 are at risk, especially those with multi-tenant environments or shared hosting where multiple users have local access. The medium severity rating reflects a moderate risk that requires attention but is not immediately critical. The lack of known exploits reduces immediate urgency but does not eliminate the threat, as attackers could develop exploits given the information disclosed.

Mitigation Recommendations

To mitigate CVE-2025-13193, organizations should first verify and correct the permissions of existing external inactive snapshot files to ensure they are not world-readable. This can be done by setting restrictive file permissions (e.g., 0600 or 0640) limiting access to authorized users only. Administrators should monitor and audit snapshot creation processes to detect any improper permission settings. Applying official patches or updates from Red Hat as soon as they are released is critical to address the root cause in libvirt. Additionally, organizations should enforce strict access controls on hosts running libvirt, limiting local user accounts and their privileges to reduce the attack surface. Implementing file integrity monitoring on snapshot directories can alert administrators to unauthorized permission changes. Finally, educating system administrators about secure snapshot management and regularly reviewing virtualization security policies will help prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-14T15:22:19.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691b5a78903b8a3ddb6f53b0

Added to database: 11/17/2025, 5:25:12 PM

Last enriched: 2/27/2026, 9:36:29 AM

Last updated: 3/22/2026, 9:15:22 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses