CVE-2025-41761: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in MBS UBR-01 Mk II
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
AI Analysis
Technical Summary
CVE-2025-41761 is a vulnerability classified under CWE-88, which pertains to improper neutralization of argument delimiters leading to command injection. The affected product is the MBS UBR-01 Mk II, a network device or appliance. The vulnerability arises because the UBR service account, which operates with low privileges, is allowed to execute certain binaries such as tcpdump and ip with elevated privileges via sudo. An attacker who gains local access to this service account—commonly through SSH—can craft malicious arguments that exploit the improper handling of command delimiters. This allows the attacker to inject arbitrary commands, effectively escalating privileges from the service account to full system root access. The CVSS v3.1 base score is 7.8, indicating high severity, with metrics AV:L (local attack vector), AC:L (low attack complexity), PR:L (low privileges required), UI:N (no user interaction), S:U (unchanged scope), and high impact on confidentiality, integrity, and availability. No patches are currently listed, and no exploits have been observed in the wild, but the vulnerability represents a critical risk due to the potential for complete system compromise once local access is obtained.
Potential Impact
The primary impact of this vulnerability is full system compromise of the MBS UBR-01 Mk II device by a low-privileged local attacker. This can lead to unauthorized access to sensitive network data, disruption of network services, and potential lateral movement within an organization's infrastructure. Since the device likely plays a role in network routing or monitoring, attackers could intercept or manipulate network traffic, degrade service availability, or establish persistent footholds. Organizations relying on these devices for critical network functions face risks including data breaches, operational downtime, and loss of trust. The requirement for local access limits remote exploitation but does not eliminate risk, as attackers who gain initial footholds via compromised credentials or other means can leverage this vulnerability to escalate privileges and deepen their control.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit and restrict sudo permissions for the UBR service account, ensuring it cannot execute binaries like tcpdump and ip with elevated privileges unless absolutely necessary. Implement strict access controls and monitoring on SSH and other local access methods to prevent unauthorized logins to the service account. Employ multi-factor authentication and strong credential management to reduce the risk of account compromise. Network segmentation can limit the exposure of vulnerable devices. Since no patches are currently available, consider isolating affected devices or replacing them with updated hardware or firmware versions once released. Regularly monitor logs for suspicious activity related to the service account and binaries involved. Engage with the vendor for updates and apply security advisories promptly when patches become available.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Singapore
CVE-2025-41761: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in MBS UBR-01 Mk II
Description
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-41761 is a vulnerability classified under CWE-88, which pertains to improper neutralization of argument delimiters leading to command injection. The affected product is the MBS UBR-01 Mk II, a network device or appliance. The vulnerability arises because the UBR service account, which operates with low privileges, is allowed to execute certain binaries such as tcpdump and ip with elevated privileges via sudo. An attacker who gains local access to this service account—commonly through SSH—can craft malicious arguments that exploit the improper handling of command delimiters. This allows the attacker to inject arbitrary commands, effectively escalating privileges from the service account to full system root access. The CVSS v3.1 base score is 7.8, indicating high severity, with metrics AV:L (local attack vector), AC:L (low attack complexity), PR:L (low privileges required), UI:N (no user interaction), S:U (unchanged scope), and high impact on confidentiality, integrity, and availability. No patches are currently listed, and no exploits have been observed in the wild, but the vulnerability represents a critical risk due to the potential for complete system compromise once local access is obtained.
Potential Impact
The primary impact of this vulnerability is full system compromise of the MBS UBR-01 Mk II device by a low-privileged local attacker. This can lead to unauthorized access to sensitive network data, disruption of network services, and potential lateral movement within an organization's infrastructure. Since the device likely plays a role in network routing or monitoring, attackers could intercept or manipulate network traffic, degrade service availability, or establish persistent footholds. Organizations relying on these devices for critical network functions face risks including data breaches, operational downtime, and loss of trust. The requirement for local access limits remote exploitation but does not eliminate risk, as attackers who gain initial footholds via compromised credentials or other means can leverage this vulnerability to escalate privileges and deepen their control.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit and restrict sudo permissions for the UBR service account, ensuring it cannot execute binaries like tcpdump and ip with elevated privileges unless absolutely necessary. Implement strict access controls and monitoring on SSH and other local access methods to prevent unauthorized logins to the service account. Employ multi-factor authentication and strong credential management to reduce the risk of account compromise. Network segmentation can limit the exposure of vulnerable devices. Since no patches are currently available, consider isolating affected devices or replacing them with updated hardware or firmware versions once released. Regularly monitor logs for suspicious activity related to the service account and binaries involved. Engage with the vendor for updates and apply security advisories promptly when patches become available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.760Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae86d72904315ca3e5dbee
Added to database: 3/9/2026, 8:37:43 AM
Last enriched: 3/16/2026, 9:41:48 AM
Last updated: 4/28/2026, 2:33:13 PM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.