Skip to main content

CVE-2025-29906: CWE-287: Improper Authentication in troglobit finit

High
VulnerabilityCVE-2025-29906cvecve-2025-29906cwe-287
Published: Tue Apr 29 2025 (04/29/2025, 22:17:47 UTC)
Source: CVE
Vendor/Project: troglobit
Product: finit

Description

Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11.

AI-Powered Analysis

AILast updated: 06/25/2025, 10:47:26 UTC

Technical Analysis

CVE-2025-29906 is a high-severity vulnerability affecting the 'finit' init system for Linux, specifically versions from 3.0-rc1 up to but not including 4.11. Finit is a fast init replacement used to initialize and manage system services during boot. The vulnerability arises from an improper authentication mechanism (CWE-287) in the bundled implementation of 'getty' for the 'tty' configuration directive. Getty is responsible for managing terminal login prompts. In the affected finit versions, this getty implementation bypasses the standard '/bin/login' authentication process, allowing an attacker to log in as any user without providing valid credentials. This effectively grants unauthorized access to the system with the privileges of the targeted user account. The vulnerability requires local access to the terminal or a tty interface, and user interaction is needed to trigger the login bypass. The scope is critical because it compromises confidentiality, integrity, and availability (C, I, A) of the system, enabling full system compromise. The issue has been patched in finit version 4.11, and users are strongly advised to upgrade. No known exploits are currently reported in the wild, but the ease of exploitation and impact make this a significant threat to affected systems.

Potential Impact

For European organizations, this vulnerability poses a serious risk, especially for those relying on finit as their init system in embedded devices, IoT infrastructure, or specialized Linux distributions. Unauthorized login bypass can lead to full system compromise, data theft, service disruption, and lateral movement within networks. Critical infrastructure sectors such as telecommunications, manufacturing, and energy that use Linux-based control systems could be targeted. The vulnerability could also facilitate ransomware deployment or espionage activities. Since finit is often used in lightweight or embedded environments, patching may be delayed, increasing exposure. The compromise of systems in regulated industries could lead to compliance violations under GDPR and other data protection laws, resulting in legal and financial repercussions. Additionally, the vulnerability could be exploited to disrupt services or gain footholds in networks of European governmental or strategic organizations, amplifying geopolitical risks.

Mitigation Recommendations

1. Immediate upgrade to finit version 4.11 or later, where the vulnerability is patched, is the most effective mitigation. 2. For systems where upgrading is not immediately feasible, restrict physical and remote access to terminals and tty interfaces to trusted personnel only. 3. Implement strict access controls and monitoring on devices running finit, including logging of login attempts and unusual activity on tty devices. 4. Use multi-factor authentication (MFA) at the system or network level to add an additional layer of security beyond the vulnerable getty implementation. 5. Employ network segmentation to isolate critical Linux systems running finit from less secure network zones. 6. Regularly audit installed software versions and configurations to identify and remediate vulnerable finit instances. 7. Consider deploying host-based intrusion detection systems (HIDS) to detect anomalous login behaviors indicative of exploitation attempts. 8. Coordinate with vendors and embedded system manufacturers to ensure timely updates and patches are applied in supply chains.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-03-12T13:42:22.134Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbedace

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 10:47:26 AM

Last updated: 8/18/2025, 11:33:29 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats