CVE-2025-29906: CWE-287: Improper Authentication in troglobit finit
Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11.
AI Analysis
Technical Summary
CVE-2025-29906 is a high-severity vulnerability affecting the 'finit' init system for Linux, specifically versions from 3.0-rc1 up to but not including 4.11. Finit is a fast init replacement used to initialize and manage system services during boot. The vulnerability arises from an improper authentication mechanism (CWE-287) in the bundled implementation of 'getty' for the 'tty' configuration directive. Getty is responsible for managing terminal login prompts. In the affected finit versions, this getty implementation bypasses the standard '/bin/login' authentication process, allowing an attacker to log in as any user without providing valid credentials. This effectively grants unauthorized access to the system with the privileges of the targeted user account. The vulnerability requires local access to the terminal or a tty interface, and user interaction is needed to trigger the login bypass. The scope is critical because it compromises confidentiality, integrity, and availability (C, I, A) of the system, enabling full system compromise. The issue has been patched in finit version 4.11, and users are strongly advised to upgrade. No known exploits are currently reported in the wild, but the ease of exploitation and impact make this a significant threat to affected systems.
Potential Impact
For European organizations, this vulnerability poses a serious risk, especially for those relying on finit as their init system in embedded devices, IoT infrastructure, or specialized Linux distributions. Unauthorized login bypass can lead to full system compromise, data theft, service disruption, and lateral movement within networks. Critical infrastructure sectors such as telecommunications, manufacturing, and energy that use Linux-based control systems could be targeted. The vulnerability could also facilitate ransomware deployment or espionage activities. Since finit is often used in lightweight or embedded environments, patching may be delayed, increasing exposure. The compromise of systems in regulated industries could lead to compliance violations under GDPR and other data protection laws, resulting in legal and financial repercussions. Additionally, the vulnerability could be exploited to disrupt services or gain footholds in networks of European governmental or strategic organizations, amplifying geopolitical risks.
Mitigation Recommendations
1. Immediate upgrade to finit version 4.11 or later, where the vulnerability is patched, is the most effective mitigation. 2. For systems where upgrading is not immediately feasible, restrict physical and remote access to terminals and tty interfaces to trusted personnel only. 3. Implement strict access controls and monitoring on devices running finit, including logging of login attempts and unusual activity on tty devices. 4. Use multi-factor authentication (MFA) at the system or network level to add an additional layer of security beyond the vulnerable getty implementation. 5. Employ network segmentation to isolate critical Linux systems running finit from less secure network zones. 6. Regularly audit installed software versions and configurations to identify and remediate vulnerable finit instances. 7. Consider deploying host-based intrusion detection systems (HIDS) to detect anomalous login behaviors indicative of exploitation attempts. 8. Coordinate with vendors and embedded system manufacturers to ensure timely updates and patches are applied in supply chains.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-29906: CWE-287: Improper Authentication in troglobit finit
Description
Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11.
AI-Powered Analysis
Technical Analysis
CVE-2025-29906 is a high-severity vulnerability affecting the 'finit' init system for Linux, specifically versions from 3.0-rc1 up to but not including 4.11. Finit is a fast init replacement used to initialize and manage system services during boot. The vulnerability arises from an improper authentication mechanism (CWE-287) in the bundled implementation of 'getty' for the 'tty' configuration directive. Getty is responsible for managing terminal login prompts. In the affected finit versions, this getty implementation bypasses the standard '/bin/login' authentication process, allowing an attacker to log in as any user without providing valid credentials. This effectively grants unauthorized access to the system with the privileges of the targeted user account. The vulnerability requires local access to the terminal or a tty interface, and user interaction is needed to trigger the login bypass. The scope is critical because it compromises confidentiality, integrity, and availability (C, I, A) of the system, enabling full system compromise. The issue has been patched in finit version 4.11, and users are strongly advised to upgrade. No known exploits are currently reported in the wild, but the ease of exploitation and impact make this a significant threat to affected systems.
Potential Impact
For European organizations, this vulnerability poses a serious risk, especially for those relying on finit as their init system in embedded devices, IoT infrastructure, or specialized Linux distributions. Unauthorized login bypass can lead to full system compromise, data theft, service disruption, and lateral movement within networks. Critical infrastructure sectors such as telecommunications, manufacturing, and energy that use Linux-based control systems could be targeted. The vulnerability could also facilitate ransomware deployment or espionage activities. Since finit is often used in lightweight or embedded environments, patching may be delayed, increasing exposure. The compromise of systems in regulated industries could lead to compliance violations under GDPR and other data protection laws, resulting in legal and financial repercussions. Additionally, the vulnerability could be exploited to disrupt services or gain footholds in networks of European governmental or strategic organizations, amplifying geopolitical risks.
Mitigation Recommendations
1. Immediate upgrade to finit version 4.11 or later, where the vulnerability is patched, is the most effective mitigation. 2. For systems where upgrading is not immediately feasible, restrict physical and remote access to terminals and tty interfaces to trusted personnel only. 3. Implement strict access controls and monitoring on devices running finit, including logging of login attempts and unusual activity on tty devices. 4. Use multi-factor authentication (MFA) at the system or network level to add an additional layer of security beyond the vulnerable getty implementation. 5. Employ network segmentation to isolate critical Linux systems running finit from less secure network zones. 6. Regularly audit installed software versions and configurations to identify and remediate vulnerable finit instances. 7. Consider deploying host-based intrusion detection systems (HIDS) to detect anomalous login behaviors indicative of exploitation attempts. 8. Coordinate with vendors and embedded system manufacturers to ensure timely updates and patches are applied in supply chains.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-03-12T13:42:22.134Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbedace
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 10:47:26 AM
Last updated: 8/18/2025, 11:33:29 PM
Views: 17
Related Threats
CVE-2025-27721: CWE-497 in INFINITT Healthcare INFINITT PACS System Manager
HighCVE-2025-3128: CWE-78 in Mitsubishi Electric Europe smartRTU
CriticalCVE-2025-55107: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
MediumCVE-2025-55106: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Sites
MediumCVE-2025-55105: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS Enterprise Experience Sites
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.