Skip to main content

CVE-2025-5199: CWE-276 Incorrect Default Permissions in Canonical Multipass

High
VulnerabilityCVE-2025-5199cvecve-2025-5199cwe-276
Published: Fri Jul 11 2025 (07/11/2025, 23:21:30 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: Multipass

Description

In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup.

AI-Powered Analysis

AILast updated: 07/11/2025, 23:46:08 UTC

Technical Analysis

CVE-2025-5199 is a high-severity vulnerability affecting Canonical Multipass up to and including version 1.15.1 on macOS. The root cause is incorrect default permissions (CWE-276) on files executed by a Launch Daemon during system startup. Specifically, these files have permissions that allow a local attacker with limited privileges to modify them. Because the Launch Daemon runs with administrative privileges, an attacker who can alter these files can escalate their privileges to administrative level. This vulnerability requires local access and some user interaction but does not require full administrative rights initially. The vulnerability impacts confidentiality, integrity, and availability since an attacker can execute arbitrary code with elevated privileges, potentially leading to full system compromise. The CVSS v3.1 score is 7.3 (high), reflecting the ease of exploitation with low complexity and the significant impact on system security. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may rely on configuration changes or awaiting vendor updates. The vulnerability affects macOS users of Multipass, a tool widely used for managing lightweight virtual machines, often in development and testing environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to development teams and IT departments using Multipass on macOS systems. Exploitation could allow attackers to gain administrative control over affected machines, leading to potential data breaches, unauthorized access to sensitive information, and disruption of critical services. Since Multipass is often used for cloud and containerized application development, a successful attack could also compromise development pipelines or staging environments, potentially allowing attackers to inject malicious code into production workflows. The local nature of the attack means that insider threats or attackers who have gained limited access to endpoints could escalate privileges and move laterally within networks. This risk is heightened in organizations with macOS-heavy environments or those relying on Multipass for virtualization. The lack of patches at the time of disclosure means organizations must act quickly to implement mitigations to prevent exploitation.

Mitigation Recommendations

Organizations should immediately audit macOS systems running Multipass for versions up to 1.15.1 and restrict local user permissions to prevent unauthorized file modifications related to the Launch Daemon. Until an official patch is released, consider disabling or restricting the Multipass service on macOS systems where it is not essential. Employ macOS security features such as System Integrity Protection (SIP) to limit the ability to modify system files and daemons. Monitor system logs for unusual modifications to Multipass-related files or Launch Daemon activities. Implement strict endpoint security controls, including application whitelisting and file integrity monitoring, to detect and prevent unauthorized changes. Educate local users about the risks of privilege escalation and enforce least privilege principles to reduce the attack surface. Once Canonical releases a patch, prioritize timely deployment across all affected systems. Additionally, consider isolating development environments using network segmentation to limit potential lateral movement if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2025-05-26T12:29:30.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68719ecda83201eaacb1b8a0

Added to database: 7/11/2025, 11:31:25 PM

Last enriched: 7/11/2025, 11:46:08 PM

Last updated: 7/12/2025, 12:37:29 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats