Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57848: Incorrect Default Permissions in Red Hat Red Hat OpenShift Virtualization 4

0
Medium
VulnerabilityCVE-2025-57848cvecve-2025-57848
Published: Thu Oct 23 2025 (10/23/2025, 20:10:31 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Virtualization 4

Description

A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

AI-Powered Analysis

AILast updated: 11/07/2025, 06:32:37 UTC

Technical Analysis

CVE-2025-57848 is a container privilege escalation vulnerability identified in Red Hat OpenShift Virtualization 4, specifically affecting certain container-native virtualization images. The root cause is the /etc/passwd file being created with group-writable permissions during the container image build process. This misconfiguration allows any user who can execute commands inside the container and is a member of the root group to modify the /etc/passwd file. By altering this file, an attacker can add new user entries with arbitrary user IDs, including UID 0, effectively granting themselves root privileges within the container. The vulnerability requires the attacker to have command execution capability inside the container and membership in the root group, which is a high privilege level, but does not require further user interaction. The CVSS v3.1 score is 5.2 (medium), reflecting the local attack vector with high attack complexity and privileges required, limited confidentiality impact but high integrity impact, and low availability impact. While the vulnerability does not directly affect the host system, it undermines container isolation and could be leveraged as a stepping stone for further attacks within containerized environments. No known exploits have been reported in the wild as of the publication date. The issue highlights the importance of secure container image build practices and strict permission settings on critical system files within containers.

Potential Impact

For European organizations deploying Red Hat OpenShift Virtualization 4, this vulnerability poses a risk of privilege escalation within containerized workloads. Attackers who gain limited access to containers and have root group membership could escalate privileges to root inside the container, potentially compromising application integrity and confidentiality of containerized data. While the vulnerability does not directly compromise the host OS, it weakens container isolation, increasing the risk of lateral movement or further exploitation if combined with other vulnerabilities. Organizations relying heavily on containerized virtualization for critical workloads, especially in sectors like finance, healthcare, and government, could face operational disruptions and data integrity issues. The medium severity rating suggests a moderate but non-trivial risk, emphasizing the need for timely remediation to prevent exploitation in multi-tenant or shared environments common in European cloud and enterprise deployments.

Mitigation Recommendations

1. Apply patches or updates from Red Hat as soon as they become available to correct the file permission settings during container image builds. 2. Review and harden container image build pipelines to ensure /etc/passwd and other critical system files are created with least-privilege permissions, avoiding group-writable settings. 3. Restrict root group membership within containers to only trusted processes and users, minimizing the attack surface for privilege escalation. 4. Implement runtime security controls and monitoring to detect unauthorized modifications to critical files like /etc/passwd inside containers. 5. Use container security tools that enforce immutability or read-only file systems for sensitive files to prevent unauthorized changes. 6. Conduct regular security audits of container configurations and permissions to identify and remediate misconfigurations proactively. 7. Employ network segmentation and access controls to limit container access to only necessary users and services, reducing the likelihood of an attacker gaining command execution inside containers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-08-21T14:40:40.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa8e34326f59cb11ee3240

Added to database: 10/23/2025, 8:21:08 PM

Last enriched: 11/7/2025, 6:32:37 AM

Last updated: 12/7/2025, 12:03:29 PM

Views: 170

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats