Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2157: Insecure Storage of Sensitive Information in Red Hat Satellite Server

0
Low
VulnerabilityCVE-2025-2157cvecve-2025-2157
Published: Sat Mar 15 2025 (03/15/2025, 06:35:52 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Satellite Server

Description

A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.

AI-Powered Analysis

AILast updated: 11/21/2025, 07:27:05 UTC

Technical Analysis

CVE-2025-2157 is a security vulnerability identified in Red Hat Satellite Server versions 6.16 and 6.17, specifically related to the Foreman component. The root cause is improper file permission settings on temporary files created under the /var/tmp directory. These temporary files contain sensitive command outputs, including highly sensitive data such as the contents of /etc/shadow, which stores hashed user passwords. Because the permissions are too permissive, low-privileged operating system users can monitor and access these files, leading to unauthorized disclosure of sensitive information. Although the vulnerability does not directly allow remote exploitation or require user interaction, the exposure of /etc/shadow can facilitate privilege escalation attacks if an attacker can leverage the disclosed information to compromise higher-privileged accounts. The CVSS 3.1 base score is 3.3, reflecting a low severity primarily due to the requirement for local low-privileged access and the lack of impact on integrity or availability. No public exploits have been reported, and no patches are linked yet, indicating this is a newly disclosed issue. The vulnerability highlights the importance of secure file permission management in systems handling sensitive data, especially in enterprise-grade infrastructure management tools like Red Hat Satellite Server.

Potential Impact

For European organizations, the impact of CVE-2025-2157 centers on potential information disclosure and subsequent privilege escalation within environments using Red Hat Satellite Server versions 6.16 and 6.17. Red Hat Satellite Server is widely used in enterprise IT environments for lifecycle management of Red Hat Enterprise Linux systems, including patch management and configuration. Exposure of sensitive files such as /etc/shadow could allow attackers with local access to escalate privileges, potentially compromising system integrity and confidentiality. This risk is particularly critical in sectors with strict compliance requirements such as finance, healthcare, and government institutions. While the vulnerability does not affect availability directly, the potential for privilege escalation could lead to broader system compromise if combined with other attack vectors. The limited requirement for local access reduces the attack surface but does not eliminate risk, especially in environments with multiple users or where attackers may gain initial footholds via other means. The absence of known exploits currently lowers immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-2157, organizations should immediately audit and correct file permissions on temporary files under /var/tmp used by Red Hat Satellite Server and Foreman to ensure that only authorized users can access sensitive data. Implement strict access controls and use filesystem ACLs or SELinux policies to restrict read permissions on these temporary files. Limit local user accounts and enforce the principle of least privilege to reduce the number of users who can access the system locally. Monitor system logs for unusual access patterns to /var/tmp and related directories. Although no official patches are linked yet, organizations should stay alert for vendor updates and apply patches promptly once available. Additionally, consider isolating Red Hat Satellite Server management interfaces and restricting access to trusted administrators only. Employ multi-factor authentication and network segmentation to reduce the risk of attackers gaining local access. Regularly review and harden system configurations and conduct internal penetration testing to identify similar permission issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-03-10T12:20:21.761Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e44190acd01a24924ee8f

Added to database: 5/21/2025, 9:22:33 PM

Last enriched: 11/21/2025, 7:27:05 AM

Last updated: 1/7/2026, 6:09:37 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats