Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53068: Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. in Oracle Corporation Oracle Solaris

0
Medium
VulnerabilityCVE-2025-53068cvecve-2025-53068
Published: Tue Oct 21 2025 (10/21/2025, 20:03:06 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Solaris

Description

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).

AI-Powered Analysis

AILast updated: 10/28/2025, 21:16:13 UTC

Technical Analysis

CVE-2025-53068 is a kernel vulnerability in Oracle Solaris 11 that permits a low-privileged attacker who has logon access to the Solaris infrastructure to compromise the system by causing it to hang or crash repeatedly, resulting in a complete denial-of-service (DoS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption leading to DoS conditions. The attack vector requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The vulnerability affects availability (A:H) but does not impact confidentiality or integrity, and the scope is changed (S:C), meaning the attack can affect components beyond the Solaris kernel itself, potentially impacting additional Oracle products that depend on Solaris. The CVSS 3.1 base score is 6.5, indicating medium severity. No public exploits are known yet, but the vulnerability is considered easily exploitable due to the low privileges and attack complexity required. The lack of patches at the time of publication suggests organizations must rely on mitigating controls until official fixes are released. The vulnerability’s impact is primarily operational, causing system instability and potential service outages, which can disrupt business continuity and critical services running on Solaris-based systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-53068 is operational disruption due to denial-of-service conditions on Oracle Solaris 11 systems. Organizations running critical infrastructure, financial services, telecommunications, or government systems on Solaris may experience system hangs or crashes, leading to downtime and potential loss of service availability. This can affect business continuity, regulatory compliance, and customer trust. The scope change indicates that other Oracle products relying on Solaris infrastructure could also be indirectly impacted, amplifying the disruption. Since the vulnerability requires only low-privileged access, insider threats or compromised user accounts pose a significant risk. The absence of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the severity of availability loss. European entities with Solaris deployments in sectors such as energy, transportation, and public administration are particularly vulnerable to operational risks and cascading effects on dependent systems.

Mitigation Recommendations

1. Restrict and tightly control local access to Oracle Solaris 11 systems, ensuring that only trusted and necessary users have logon privileges. 2. Implement robust monitoring and alerting for unusual system behavior indicative of hangs or crashes, including kernel logs and resource usage patterns. 3. Employ network segmentation and access controls to limit exposure of Solaris systems to potentially compromised accounts or insider threats. 4. Prepare incident response and business continuity plans specifically addressing denial-of-service scenarios on Solaris infrastructure. 5. Regularly check Oracle security advisories for patches or workarounds related to CVE-2025-53068 and apply them promptly once available. 6. Consider deploying additional host-based protections such as resource limits and kernel hardening features to mitigate resource exhaustion risks. 7. Conduct security awareness training for administrators and users with Solaris access to recognize and report suspicious activities. 8. Evaluate the use of alternative or updated operating systems where feasible to reduce dependency on vulnerable Solaris versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-06-24T16:45:19.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e3d

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 10/28/2025, 9:16:13 PM

Last updated: 10/29/2025, 7:03:59 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats