Skip to main content

CVE-2025-54290: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Canonical LXD

Medium
VulnerabilityCVE-2025-54290cvecve-2025-54290cwe-200
Published: Thu Oct 02 2025 (10/02/2025, 09:24:12 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: LXD

Description

Information disclosure in image export API in Canonical LXD before 6.5 and 5.21.4 on Linux allows network attackers to determine project existence without authentication via crafted requests using wildcard fingerprints.

AI-Powered Analysis

AILast updated: 10/02/2025, 09:32:57 UTC

Technical Analysis

CVE-2025-54290 is a medium-severity information disclosure vulnerability affecting Canonical's LXD container hypervisor versions prior to 6.5 and 5.21.4 on Linux. The flaw resides in the image export API, which improperly handles crafted network requests containing wildcard fingerprints. This allows unauthenticated remote attackers to infer the existence of projects within the LXD environment by exploiting the API's response behavior. Specifically, the vulnerability is categorized under CWE-200, indicating exposure of sensitive information to unauthorized actors. The vulnerability does not require any authentication or user interaction, and it can be exploited remotely over the network. The CVSS 4.0 base score is 6.9, reflecting a medium severity level primarily due to the lack of direct impact on confidentiality, integrity, or availability beyond project existence disclosure. No known exploits are currently reported in the wild, and no patches have been explicitly linked yet, though Canonical has reserved the CVE and published the advisory. The vulnerability affects LXD versions 6.0 and 5.21, which are widely used in Linux container management for cloud and enterprise deployments. Attackers leveraging this flaw can gather reconnaissance information about container projects, potentially aiding further targeted attacks or lateral movement within compromised environments.

Potential Impact

For European organizations, the impact of CVE-2025-54290 lies mainly in the exposure of sensitive project existence information within LXD-managed container environments. While this does not directly compromise data confidentiality or system integrity, it provides attackers with valuable intelligence that can facilitate more sophisticated attacks, such as targeted exploitation of specific projects or containers. Organizations relying heavily on LXD for container orchestration, especially in sectors like finance, government, and critical infrastructure, may face increased risk of reconnaissance-based attacks. The vulnerability's network-exploitable nature without authentication means attackers can probe systems remotely, increasing the attack surface. Given the growing adoption of containerization in Europe, this vulnerability could be leveraged by threat actors to map containerized environments and identify high-value targets. However, the absence of known exploits and the medium severity rating suggest the immediate risk is moderate but should not be underestimated in environments with sensitive workloads.

Mitigation Recommendations

To mitigate CVE-2025-54290, European organizations should prioritize upgrading affected LXD installations to versions 6.5 or 5.21.4 and later, where the vulnerability is addressed. Until patches are applied, network-level controls should be enforced to restrict access to the LXD API endpoints, especially the image export API, limiting it to trusted management networks or VPNs. Implementing strict firewall rules and network segmentation can reduce exposure to unauthenticated remote requests. Monitoring and logging API access patterns for unusual wildcard fingerprint queries can help detect exploitation attempts. Additionally, organizations should review container project configurations to minimize unnecessary project exposure and apply the principle of least privilege to container management interfaces. Regular vulnerability scanning and threat intelligence updates regarding LXD should be incorporated into security operations to promptly identify and respond to emerging threats related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2025-07-18T07:59:07.917Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de46967ead30c0938fe4cd

Added to database: 10/2/2025, 9:32:06 AM

Last enriched: 10/2/2025, 9:32:57 AM

Last updated: 10/3/2025, 12:10:35 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats