Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57848: Incorrect Default Permissions in Red Hat Red Hat OpenShift Virtualization 4

0
Medium
VulnerabilityCVE-2025-57848cvecve-2025-57848
Published: Thu Oct 23 2025 (10/23/2025, 20:10:31 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Virtualization 4

Description

A container privilege escalation flaw was found in certain Container-native Virtualization images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 20:38:19 UTC

Technical Analysis

CVE-2025-57848 is a security vulnerability identified in Red Hat OpenShift Virtualization 4, specifically affecting certain container-native virtualization images. The root cause is the incorrect default permissions assigned to the /etc/passwd file during the container image build process, where the file is created with group-writable permissions. This misconfiguration allows users who have command execution capabilities inside the container and are members of the root group to modify the /etc/passwd file. By doing so, an attacker can add new user entries with arbitrary user IDs, including UID 0, which corresponds to root privileges. This effectively enables privilege escalation within the container environment. The vulnerability requires the attacker to have local access to the container and elevated privileges (root group membership), and no user interaction is needed. The CVSS v3.1 base score is 6.4, reflecting a medium severity level due to the combination of high impact on confidentiality, integrity, and availability within the container, but limited attack vector (local) and higher attack complexity. There are no known exploits in the wild at the time of publication. The vulnerability does not directly compromise the host system but poses a significant risk to container security and workload isolation. The issue highlights the importance of secure container image build practices, particularly regarding file permissions on critical system files like /etc/passwd.

Potential Impact

The primary impact of CVE-2025-57848 is the potential for privilege escalation within affected containers, allowing an attacker to gain root-level access inside the container environment. This can lead to unauthorized access to sensitive data, modification or deletion of containerized applications and data, and disruption of container services. While the vulnerability does not directly compromise the host operating system, successful exploitation undermines container isolation, increasing the risk of further attacks such as container escape or lateral movement within the cluster. Organizations relying on Red Hat OpenShift Virtualization 4 for critical workloads may face increased risk of container compromise, data breaches, and service outages. The medium CVSS score reflects the need for attention but also the requirement for certain preconditions, such as root group membership and local container access, which somewhat limits the attack surface. However, in multi-tenant or shared environments, the risk is elevated due to potential insider threats or compromised containers.

Mitigation Recommendations

To mitigate CVE-2025-57848, organizations should immediately review and update their container image build processes to ensure that critical system files like /etc/passwd are created with secure, non-group-writable permissions. Applying vendor-provided patches or updates from Red Hat as soon as they become available is essential. Implement strict access controls to limit which users and processes have root group membership within containers, minimizing the risk of privilege escalation. Employ container security best practices such as running containers with the least privilege, using security contexts and SELinux/AppArmor profiles to restrict container capabilities, and enabling read-only file systems where feasible. Regularly audit container images and running containers for misconfigurations and unauthorized changes to critical files. Additionally, monitor container logs and behavior for signs of suspicious activity indicative of privilege escalation attempts. Consider integrating automated security scanning tools into the CI/CD pipeline to detect insecure file permissions during image builds.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-08-21T14:40:40.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa8e34326f59cb11ee3240

Added to database: 10/23/2025, 8:21:08 PM

Last enriched: 3/7/2026, 8:38:19 PM

Last updated: 3/24/2026, 9:01:25 AM

Views: 220

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses