Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54290: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Canonical LXD

0
Medium
VulnerabilityCVE-2025-54290cvecve-2025-54290cwe-200
Published: Thu Oct 02 2025 (10/02/2025, 09:24:12 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: LXD

Description

Information disclosure in image export API in Canonical LXD before 6.5 and 5.21.4 on Linux allows network attackers to determine project existence without authentication via crafted requests using wildcard fingerprints.

AI-Powered Analysis

AILast updated: 10/09/2025, 10:05:39 UTC

Technical Analysis

CVE-2025-54290 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Canonical's LXD container hypervisor software on Linux platforms. The flaw exists in the image export API of LXD versions prior to 6.5 and 5.21.4, where crafted network requests using wildcard fingerprints can be sent without authentication to the API. This allows an attacker to infer the existence of projects managed by LXD, effectively leaking sensitive metadata about the container environment. The vulnerability arises because the API does not properly restrict or validate requests that use wildcard characters in fingerprint parameters, leading to unauthorized information disclosure. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction required. The impact is limited to information disclosure without direct compromise of data integrity or availability. No patches were linked at the time of publication, but Canonical is expected to release fixes in upcoming versions. No known exploitation in the wild has been reported, but the vulnerability could be leveraged as a reconnaissance step in multi-stage attacks targeting containerized environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in terms of information leakage that could facilitate further attacks. By revealing the existence of projects on LXD hosts, attackers gain intelligence that can be used to tailor subsequent exploits or lateral movement strategies. Organizations heavily reliant on containerization and Linux-based infrastructure, such as cloud service providers, financial institutions, and critical infrastructure operators, may find this particularly concerning. Although the vulnerability does not directly compromise data confidentiality or system integrity, the exposure of project metadata can weaken security postures and increase the attack surface. Additionally, the ease of exploitation without authentication means that attackers can perform reconnaissance from remote locations without needing insider access. This could lead to targeted attacks against high-value containerized workloads prevalent in European data centers. The medium severity rating reflects the moderate but non-trivial risk posed by this vulnerability.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Upgrade affected LXD installations to version 6.5 or 5.21.4 (or later) as soon as patches become available from Canonical. 2) Restrict network access to the LXD API endpoints by implementing firewall rules or network segmentation to limit exposure to trusted hosts only. 3) Monitor network traffic for unusual or repeated requests containing wildcard fingerprints or other anomalous patterns targeting the image export API. 4) Employ API authentication and authorization mechanisms to ensure that only authorized users and systems can query project information. 5) Conduct regular audits of container environments to identify and remediate any unauthorized access or information leakage. 6) Integrate vulnerability scanning and threat intelligence feeds to stay informed about emerging exploits related to LXD. 7) Educate DevOps and security teams about the risks of information disclosure in container orchestration platforms and enforce secure configuration baselines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2025-07-18T07:59:07.917Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de46967ead30c0938fe4cd

Added to database: 10/2/2025, 9:32:06 AM

Last enriched: 10/9/2025, 10:05:39 AM

Last updated: 11/18/2025, 8:32:40 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats