Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26600: Use After Free

0
High
VulnerabilityCVE-2025-26600cvecve-2025-26600
Published: Tue Feb 25 2025 (02/25/2025, 15:55:20 UTC)
Source: CVE

Description

A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:41:03 UTC

Technical Analysis

CVE-2025-26600 is a use-after-free vulnerability identified in the X.Org server and Xwayland components, which are critical parts of the graphical display infrastructure on many Unix-like operating systems, including Linux. The flaw arises when a device is removed while it is in a 'frozen' state. During this state, events generated for the device are queued but not processed immediately. If the device is freed from memory while these events remain queued, subsequent replay or processing of these stale events leads to a use-after-free condition. This memory corruption can be exploited to execute arbitrary code with the privileges of the X.Org or Xwayland process, or cause a denial of service by crashing the display server. The vulnerability requires local access with low privileges and does not require user interaction, making it easier for an attacker with limited access to escalate privileges or disrupt system availability. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. No public exploits are known at this time, but the vulnerability is critical enough to warrant immediate attention. The affected versions include X.Org and Xwayland up to version 22.0.0, and users should monitor vendor advisories for patches. The root cause is improper handling of device lifecycle and event queues, indicating a need for improved memory and event management in the affected components.

Potential Impact

The vulnerability poses a significant risk to organizations relying on X.Org and Xwayland for graphical display services, particularly in Linux desktop and server environments. Exploitation could allow attackers with local access to execute arbitrary code with elevated privileges, potentially leading to full system compromise. This could result in unauthorized data access, modification, or destruction (confidentiality and integrity impacts), as well as service disruption through crashes or denial of service (availability impact). Given the widespread use of X.Org in many enterprise and government Linux deployments, the vulnerability could affect critical infrastructure, development environments, and cloud services that use Linux graphical interfaces. The ease of exploitation without user interaction increases the threat level, especially in multi-user systems or environments where local access is possible. Although no known exploits are reported yet, the vulnerability's characteristics make it a prime target for attackers seeking privilege escalation or persistent access.

Mitigation Recommendations

Organizations should prioritize applying patches from X.Org or Linux distribution vendors as soon as they become available. Until patches are released, administrators can mitigate risk by restricting local access to trusted users only, minimizing the number of users with the ability to interact with graphical devices. Implementing strict device management policies to avoid removing devices while frozen can reduce the chance of triggering the vulnerability. Monitoring system logs for unusual device removal or event queue activity may help detect exploitation attempts. Additionally, running X.Org and Xwayland processes with the least privileges necessary and employing sandboxing or containerization techniques can limit the impact of a successful exploit. Regularly updating and auditing software dependencies and configurations related to graphical subsystems will further reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-02-12T14:12:22.796Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba61

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/27/2026, 12:41:03 PM

Last updated: 3/26/2026, 6:59:20 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses