Skip to main content

CVE-2025-54291: CWE-209 Generation of Error Message Containing Sensitive Information in Canonical LXD

Medium
VulnerabilityCVE-2025-54291cvecve-2025-54291cwe-209
Published: Thu Oct 02 2025 (10/02/2025, 09:25:42 UTC)
Source: CVE Database V5
Vendor/Project: Canonical
Product: LXD

Description

Information disclosure in images API in Canonical LXD before 6.5 and 5.21.4 on all platforms allows unauthenticated remote attackers to determine project existence via differing HTTP status code responses.

AI-Powered Analysis

AILast updated: 10/02/2025, 09:32:46 UTC

Technical Analysis

CVE-2025-54291 is a medium-severity information disclosure vulnerability affecting Canonical's LXD container hypervisor, specifically versions prior to 6.5 and 5.21.4. The vulnerability arises from the images API, which improperly handles error messages when queried about project existence. An unauthenticated remote attacker can exploit this flaw by sending crafted requests to the images API and analyzing the differing HTTP status code responses. These differences allow the attacker to infer whether a specific project exists on the LXD server. This vulnerability is classified under CWE-209, which pertains to the generation of error messages containing sensitive information. Since the vulnerability does not require authentication, user interaction, or privileges, it can be exploited remotely over the network with minimal effort. The CVSS 4.0 base score of 6.9 reflects a medium severity level, emphasizing the moderate impact of information disclosure without direct compromise of confidentiality, integrity, or availability. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged as a reconnaissance tool to gather intelligence about the target environment, potentially aiding further targeted attacks or privilege escalation attempts. The lack of a patch link suggests that users should monitor Canonical's advisories closely for forthcoming updates or mitigations.

Potential Impact

For European organizations utilizing Canonical LXD for container management, this vulnerability poses a risk primarily related to information leakage. By revealing project existence through error message discrepancies, attackers can map the container environment, gaining insights into the organizational structure and deployment specifics. This reconnaissance capability can facilitate more sophisticated attacks, such as targeted exploitation of known vulnerabilities in specific projects or lateral movement within the infrastructure. While the vulnerability does not directly compromise data confidentiality or system integrity, the disclosed information could be sensitive in regulated sectors like finance, healthcare, or critical infrastructure, where knowledge of project configurations may aid adversaries. Additionally, organizations with strict compliance requirements under GDPR or other data protection laws must consider the implications of any unauthorized information disclosure. The vulnerability's ease of exploitation without authentication increases the risk profile, especially for publicly accessible LXD instances. However, the absence of known active exploits reduces immediate threat levels, though proactive mitigation is advisable.

Mitigation Recommendations

European organizations should implement the following specific measures to mitigate CVE-2025-54291: 1) Upgrade affected LXD installations to versions 6.5 or 5.21.4 or later as soon as Canonical releases patches addressing this vulnerability. 2) In the interim, restrict access to the LXD images API by enforcing network-level controls such as firewall rules or VPN access to limit exposure to trusted users only. 3) Implement API request filtering or rate limiting to detect and block anomalous queries that attempt to enumerate projects via error response analysis. 4) Review and harden error handling configurations to ensure that error messages do not leak sensitive information, potentially by customizing API responses or enabling verbose logging only in secure environments. 5) Conduct regular security audits and penetration tests focusing on container management interfaces to identify similar information disclosure issues. 6) Monitor Canonical security advisories and subscribe to vulnerability feeds to stay informed about patches and exploit developments. 7) Educate system administrators about the risks of exposing container management APIs publicly and enforce strict access controls and authentication mechanisms where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
canonical
Date Reserved
2025-07-18T07:59:07.917Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68de46967ead30c0938fe4d0

Added to database: 10/2/2025, 9:32:06 AM

Last enriched: 10/2/2025, 9:32:46 AM

Last updated: 10/2/2025, 12:02:47 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats