CVE-2025-2157: Insecure Storage of Sensitive Information in Red Hat Satellite Server
A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.
AI Analysis
Technical Summary
CVE-2025-2157 is a vulnerability identified in Red Hat Satellite Server versions 6.16 and 6.17, specifically related to insecure storage of sensitive information. The flaw arises from improper file permissions on temporary files created under the /var/tmp directory. These temporary files contain sensitive command outputs, including highly critical data such as the contents of /etc/shadow, which stores hashed user passwords. Because the permissions are not correctly restricted, low-privileged operating system users can monitor and access these temporary files. This exposure can lead to information disclosure, revealing sensitive system information that should otherwise be protected. While the vulnerability itself does not directly allow privilege escalation, the disclosed information could be leveraged by an attacker to facilitate privilege escalation or further attacks on the system. The vulnerability does not require user interaction but does require local access with low privileges. The CVSS 3.1 base score is 3.3, indicating a low severity primarily due to the limited attack vector (local access) and the lack of impact on integrity or availability. However, the confidentiality impact, while limited, is non-negligible given the sensitivity of the exposed data. No known exploits are reported in the wild as of the publication date. The vulnerability highlights the importance of proper file permission management on temporary files, especially in critical infrastructure management tools like Red Hat Satellite Server, which is widely used for managing large-scale Red Hat Enterprise Linux deployments.
Potential Impact
For European organizations, the impact of CVE-2025-2157 can be significant in environments where Red Hat Satellite Server is deployed to manage enterprise Linux systems. Exposure of sensitive files such as /etc/shadow could allow malicious insiders or compromised low-privileged users to extract password hashes and attempt offline cracking attacks, potentially leading to unauthorized access to privileged accounts. This could undermine the confidentiality of the managed systems and lead to lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of information disclosure could result in privilege escalation and subsequent disruption or data breaches. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face compliance risks if sensitive information is leaked. The threat is particularly relevant in multi-tenant or shared environments where multiple users have local access but different privilege levels. Given the local access requirement, remote exploitation is not feasible unless combined with other vulnerabilities or attack vectors that provide local access.
Mitigation Recommendations
To mitigate CVE-2025-2157, European organizations should: 1) Immediately apply any patches or updates released by Red Hat for Satellite Server versions 6.16 and 6.17 once available. 2) Review and tighten file permissions on /var/tmp and any temporary files created by Satellite Server processes to ensure that only authorized users and processes can access sensitive temporary data. 3) Implement strict access controls and monitoring on systems running Satellite Server to detect unauthorized local access attempts. 4) Limit the number of users with local access to Satellite Server hosts, enforcing the principle of least privilege. 5) Employ additional security controls such as SELinux or AppArmor profiles to restrict process capabilities and file access. 6) Conduct regular audits of temporary file handling and permissions in critical management infrastructure. 7) Educate system administrators and users about the risks of local privilege escalation and the importance of safeguarding sensitive files. 8) Consider network segmentation and isolation of Satellite Server hosts to reduce the risk of lateral movement if local access is compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-2157: Insecure Storage of Sensitive Information in Red Hat Satellite Server
Description
A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.
AI-Powered Analysis
Technical Analysis
CVE-2025-2157 is a vulnerability identified in Red Hat Satellite Server versions 6.16 and 6.17, specifically related to insecure storage of sensitive information. The flaw arises from improper file permissions on temporary files created under the /var/tmp directory. These temporary files contain sensitive command outputs, including highly critical data such as the contents of /etc/shadow, which stores hashed user passwords. Because the permissions are not correctly restricted, low-privileged operating system users can monitor and access these temporary files. This exposure can lead to information disclosure, revealing sensitive system information that should otherwise be protected. While the vulnerability itself does not directly allow privilege escalation, the disclosed information could be leveraged by an attacker to facilitate privilege escalation or further attacks on the system. The vulnerability does not require user interaction but does require local access with low privileges. The CVSS 3.1 base score is 3.3, indicating a low severity primarily due to the limited attack vector (local access) and the lack of impact on integrity or availability. However, the confidentiality impact, while limited, is non-negligible given the sensitivity of the exposed data. No known exploits are reported in the wild as of the publication date. The vulnerability highlights the importance of proper file permission management on temporary files, especially in critical infrastructure management tools like Red Hat Satellite Server, which is widely used for managing large-scale Red Hat Enterprise Linux deployments.
Potential Impact
For European organizations, the impact of CVE-2025-2157 can be significant in environments where Red Hat Satellite Server is deployed to manage enterprise Linux systems. Exposure of sensitive files such as /etc/shadow could allow malicious insiders or compromised low-privileged users to extract password hashes and attempt offline cracking attacks, potentially leading to unauthorized access to privileged accounts. This could undermine the confidentiality of the managed systems and lead to lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of information disclosure could result in privilege escalation and subsequent disruption or data breaches. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, may face compliance risks if sensitive information is leaked. The threat is particularly relevant in multi-tenant or shared environments where multiple users have local access but different privilege levels. Given the local access requirement, remote exploitation is not feasible unless combined with other vulnerabilities or attack vectors that provide local access.
Mitigation Recommendations
To mitigate CVE-2025-2157, European organizations should: 1) Immediately apply any patches or updates released by Red Hat for Satellite Server versions 6.16 and 6.17 once available. 2) Review and tighten file permissions on /var/tmp and any temporary files created by Satellite Server processes to ensure that only authorized users and processes can access sensitive temporary data. 3) Implement strict access controls and monitoring on systems running Satellite Server to detect unauthorized local access attempts. 4) Limit the number of users with local access to Satellite Server hosts, enforcing the principle of least privilege. 5) Employ additional security controls such as SELinux or AppArmor profiles to restrict process capabilities and file access. 6) Conduct regular audits of temporary file handling and permissions in critical management infrastructure. 7) Educate system administrators and users about the risks of local privilege escalation and the importance of safeguarding sensitive files. 8) Consider network segmentation and isolation of Satellite Server hosts to reduce the risk of lateral movement if local access is compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-03-10T12:20:21.761Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e44190acd01a24924ee8f
Added to database: 5/21/2025, 9:22:33 PM
Last enriched: 9/3/2025, 12:35:21 AM
Last updated: 9/26/2025, 3:05:06 PM
Views: 22
Related Threats
CVE-2025-59845: CWE-346: Origin Validation Error in apollographql embeddable-explorer
HighCVE-2025-10657: CWE-269 Improper Privilege Management in Docker Docker Desktop
HighCVE-2025-11046: Server-Side Request Forgery in Tencent WeKnora
MediumCVE-2025-59362: n/a
HighCVE-2025-55848: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.