Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3528: Incorrect Default Permissions

0
High
VulnerabilityCVE-2025-3528cvecve-2025-3528
Published: Fri May 09 2025 (05/09/2025, 11:58:24 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: mirror registry for Red Hat OpenShift

Description

A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:36:49 UTC

Technical Analysis

CVE-2025-3528 identifies a critical security flaw in the Mirror Registry component of Red Hat OpenShift, specifically within the quay-app container. The vulnerability arises because the quay-app container is shipped with incorrect default permissions that allow write access to the /etc/passwd file, a critical system file that manages user account information. This misconfiguration enables a malicious actor who has access to the container to modify the passwd file, effectively allowing them to escalate their privileges to root within the pod. The vulnerability is classified with a CVSS 3.1 score of 8.2, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the impact extends beyond the vulnerable component to other resources. The impact includes high confidentiality, integrity, and availability consequences, as root access within the pod can lead to unauthorized data access, modification, and potential disruption of services. Although no known exploits are reported in the wild, the flaw poses a significant risk in environments where attackers can gain container access, such as through compromised credentials or other vulnerabilities. The flaw affects all versions of the Mirror Registry component as shipped with OpenShift at the time of disclosure. This vulnerability highlights the importance of secure default permissions in containerized environments and the risks of privilege escalation within Kubernetes pods.

Potential Impact

The vulnerability allows attackers with container access to escalate privileges to root within the pod, compromising confidentiality, integrity, and availability of containerized workloads. Root access inside the pod can enable attackers to manipulate application data, bypass security controls, and potentially pivot to other parts of the cluster if combined with other vulnerabilities or misconfigurations. This can lead to data breaches, service disruptions, and loss of trust in the affected systems. Organizations relying on Red Hat OpenShift with the Mirror Registry component are at risk of targeted attacks, especially in multi-tenant or shared environments where container isolation is critical. The flaw could be exploited by insiders or external attackers who have gained limited access, amplifying the threat. Although no exploits are currently known in the wild, the high severity and ease of exploitation under certain conditions make this a critical issue to address promptly.

Mitigation Recommendations

1. Immediately apply any patches or updates released by Red Hat addressing CVE-2025-3528 once available. 2. Until patches are available, restrict access to the quay-app container by enforcing strict RBAC policies and network segmentation to minimize the risk of unauthorized container access. 3. Implement container runtime security tools that monitor and alert on unauthorized file modifications, especially to critical files like /etc/passwd. 4. Use Pod Security Policies or OpenShift Security Context Constraints to enforce least privilege and prevent containers from running with unnecessary permissions. 5. Regularly audit container configurations and permissions to detect insecure defaults or deviations from best practices. 6. Employ multi-factor authentication and strong credential management to reduce the risk of initial container access by attackers. 7. Consider using container image scanning tools to detect insecure configurations before deployment. 8. Monitor logs and container behavior for signs of privilege escalation attempts or suspicious activity within pods.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-11T18:46:42.874Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7a5c

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 2/27/2026, 1:36:49 PM

Last updated: 3/27/2026, 10:12:19 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses