Skip to main content

CVE-2025-23395: CWE-271: Privilege Dropping / Lowering Errors

High
VulnerabilityCVE-2025-23395cvecve-2025-23395cwe-271
Published: Mon May 26 2025 (05/26/2025, 15:18:46 UTC)
Source: CVE

Description

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

AI-Powered Analysis

AILast updated: 07/11/2025, 11:19:57 UTC

Technical Analysis

CVE-2025-23395 is a high-severity vulnerability affecting Screen version 5.0.0, a terminal multiplexer program commonly used on Unix-like systems. The vulnerability arises because Screen, when running with setuid-root privileges, fails to properly drop elevated privileges while operating on user-supplied file paths. Specifically, this flaw allows unprivileged users to create files in arbitrary locations with root ownership, the invoking user's real group ownership, and file permissions set to 0644. Since all data written to the Screen pseudo-terminal (PTY) is logged into this file, an attacker can manipulate this behavior to escalate privileges to root. The core issue is a privilege dropping/lowering error classified under CWE-271, where the program does not relinquish root privileges when handling untrusted input paths, leading to unauthorized file creation with elevated permissions. The CVSS v3.1 base score is 7.8, indicating a high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk for privilege escalation on affected systems. The lack of patch links suggests that fixes may not yet be publicly available or are pending release. Organizations using Screen 5.0.0 with setuid-root enabled should consider this vulnerability critical to address promptly to prevent unauthorized root-level access and potential system compromise.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially in environments where Screen is deployed with setuid-root privileges, such as multi-user servers, shared hosting environments, or critical infrastructure systems. Successful exploitation could allow attackers with limited local access to escalate privileges to root, leading to full system compromise. This threatens confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially disrupting system operations. Given the widespread use of Screen in Unix/Linux environments across Europe, including in government, finance, healthcare, and industrial sectors, the impact could be severe. Attackers could leverage this vulnerability to implant persistent backdoors, exfiltrate data, or disrupt services. The absence of required user interaction and the low complexity of exploitation increase the likelihood of successful attacks once local access is obtained. This elevates the threat level for organizations relying on Screen for terminal multiplexing, especially those with strict regulatory compliance requirements such as GDPR, where unauthorized data access and system compromise can lead to significant legal and financial consequences.

Mitigation Recommendations

To mitigate CVE-2025-23395 effectively, European organizations should: 1) Immediately audit all systems running Screen 5.0.0 to identify instances where setuid-root privileges are enabled. 2) Disable setuid-root on Screen binaries if not strictly necessary, as running Screen without elevated privileges eliminates the attack vector. 3) If setuid-root is required, implement strict access controls limiting which users can execute Screen with elevated privileges. 4) Employ filesystem monitoring to detect unauthorized creation of files with root ownership and unusual permissions, particularly in directories writable by unprivileged users. 5) Use mandatory access control (MAC) frameworks such as SELinux or AppArmor to restrict Screen's ability to write files outside designated safe directories. 6) Monitor system logs and PTY activity for suspicious behavior indicative of exploitation attempts. 7) Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 8) Consider deploying host-based intrusion detection systems (HIDS) to detect privilege escalation attempts. 9) Educate system administrators about the risks of running setuid-root applications and enforce the principle of least privilege. These targeted measures go beyond generic advice by focusing on configuration hardening, monitoring, and access control tailored to the specific vulnerability characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
suse
Date Reserved
2025-01-15T12:39:03.324Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683487800acd01a249288781

Added to database: 5/26/2025, 3:23:44 PM

Last enriched: 7/11/2025, 11:19:57 AM

Last updated: 8/18/2025, 11:30:09 PM

Views: 61

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats