CVE-2025-23395: CWE-271: Privilege Dropping / Lowering Errors
Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges
AI Analysis
Technical Summary
CVE-2025-23395 is a high-severity vulnerability affecting Screen version 5.0.0, a terminal multiplexer program commonly used on Unix-like systems. The vulnerability arises because Screen, when running with setuid-root privileges, fails to properly drop elevated privileges while operating on user-supplied file paths. Specifically, this flaw allows unprivileged users to create files in arbitrary locations with root ownership, the invoking user's real group ownership, and file permissions set to 0644. Since all data written to the Screen pseudo-terminal (PTY) is logged into this file, an attacker can manipulate this behavior to escalate privileges to root. The core issue is a privilege dropping/lowering error classified under CWE-271, where the program does not relinquish root privileges when handling untrusted input paths, leading to unauthorized file creation with elevated permissions. The CVSS v3.1 base score is 7.8, indicating a high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk for privilege escalation on affected systems. The lack of patch links suggests that fixes may not yet be publicly available or are pending release. Organizations using Screen 5.0.0 with setuid-root enabled should consider this vulnerability critical to address promptly to prevent unauthorized root-level access and potential system compromise.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially in environments where Screen is deployed with setuid-root privileges, such as multi-user servers, shared hosting environments, or critical infrastructure systems. Successful exploitation could allow attackers with limited local access to escalate privileges to root, leading to full system compromise. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially disrupting system operations. Given the widespread use of Screen in Unix/Linux environments across Europe, including in government, finance, healthcare, and industrial sectors, the impact could be severe. Attackers could leverage this vulnerability to implant persistent backdoors, exfiltrate data, or disrupt services. The absence of required user interaction and the low complexity of exploitation increase the likelihood of successful attacks once local access is obtained. This elevates the threat level for organizations relying on Screen for terminal multiplexing, especially those with strict regulatory compliance requirements such as GDPR, where unauthorized data access and system compromise can lead to significant legal and financial consequences.
Mitigation Recommendations
To mitigate CVE-2025-23395 effectively, European organizations should: 1) Immediately audit all systems running Screen 5.0.0 to identify instances where setuid-root privileges are enabled. 2) Disable setuid-root on Screen binaries if not strictly necessary, as running Screen without elevated privileges eliminates the attack vector. 3) If setuid-root is required, implement strict access controls limiting which users can execute Screen with elevated privileges. 4) Employ filesystem monitoring to detect unauthorized creation of files with root ownership and unusual permissions, particularly in directories writable by unprivileged users. 5) Use mandatory access control (MAC) frameworks such as SELinux or AppArmor to restrict Screen's ability to write files outside designated safe directories. 6) Monitor system logs and PTY activity for suspicious behavior indicative of exploitation attempts. 7) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider deploying host-based intrusion detection systems (HIDS) to detect privilege escalation attempts. 9) Educate system administrators about the risks of running setuid-root applications and enforce the principle of least privilege. These targeted measures go beyond generic advice by focusing on configuration hardening, monitoring, and access control tailored to the specific vulnerability characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Switzerland
CVE-2025-23395: CWE-271: Privilege Dropping / Lowering Errors
Description
Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges
AI-Powered Analysis
Technical Analysis
CVE-2025-23395 is a high-severity vulnerability affecting Screen version 5.0.0, a terminal multiplexer program commonly used on Unix-like systems. The vulnerability arises because Screen, when running with setuid-root privileges, fails to properly drop elevated privileges while operating on user-supplied file paths. Specifically, this flaw allows unprivileged users to create files in arbitrary locations with root ownership, the invoking user's real group ownership, and file permissions set to 0644. Since all data written to the Screen pseudo-terminal (PTY) is logged into this file, an attacker can manipulate this behavior to escalate privileges to root. The core issue is a privilege dropping/lowering error classified under CWE-271, where the program does not relinquish root privileges when handling untrusted input paths, leading to unauthorized file creation with elevated permissions. The CVSS v3.1 base score is 7.8, indicating a high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk for privilege escalation on affected systems. The lack of patch links suggests that fixes may not yet be publicly available or are pending release. Organizations using Screen 5.0.0 with setuid-root enabled should consider this vulnerability critical to address promptly to prevent unauthorized root-level access and potential system compromise.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially in environments where Screen is deployed with setuid-root privileges, such as multi-user servers, shared hosting environments, or critical infrastructure systems. Successful exploitation could allow attackers with limited local access to escalate privileges to root, leading to full system compromise. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially disrupting system operations. Given the widespread use of Screen in Unix/Linux environments across Europe, including in government, finance, healthcare, and industrial sectors, the impact could be severe. Attackers could leverage this vulnerability to implant persistent backdoors, exfiltrate data, or disrupt services. The absence of required user interaction and the low complexity of exploitation increase the likelihood of successful attacks once local access is obtained. This elevates the threat level for organizations relying on Screen for terminal multiplexing, especially those with strict regulatory compliance requirements such as GDPR, where unauthorized data access and system compromise can lead to significant legal and financial consequences.
Mitigation Recommendations
To mitigate CVE-2025-23395 effectively, European organizations should: 1) Immediately audit all systems running Screen 5.0.0 to identify instances where setuid-root privileges are enabled. 2) Disable setuid-root on Screen binaries if not strictly necessary, as running Screen without elevated privileges eliminates the attack vector. 3) If setuid-root is required, implement strict access controls limiting which users can execute Screen with elevated privileges. 4) Employ filesystem monitoring to detect unauthorized creation of files with root ownership and unusual permissions, particularly in directories writable by unprivileged users. 5) Use mandatory access control (MAC) frameworks such as SELinux or AppArmor to restrict Screen's ability to write files outside designated safe directories. 6) Monitor system logs and PTY activity for suspicious behavior indicative of exploitation attempts. 7) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider deploying host-based intrusion detection systems (HIDS) to detect privilege escalation attempts. 9) Educate system administrators about the risks of running setuid-root applications and enforce the principle of least privilege. These targeted measures go beyond generic advice by focusing on configuration hardening, monitoring, and access control tailored to the specific vulnerability characteristics.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- suse
- Date Reserved
- 2025-01-15T12:39:03.324Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683487800acd01a249288781
Added to database: 5/26/2025, 3:23:44 PM
Last enriched: 7/11/2025, 11:19:57 AM
Last updated: 8/18/2025, 11:30:09 PM
Views: 61
Related Threats
CVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.