Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57849: Incorrect Default Permissions in Red Hat Red Hat Fuse 7

0
Medium
VulnerabilityCVE-2025-57849cvecve-2025-57849
Published: Fri Mar 13 2026 (03/13/2026, 03:08:32 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Fuse 7

Description

CVE-2025-57849 is a container privilege escalation vulnerability in Red Hat Fuse 7 images caused by incorrect default group-writable permissions on the /etc/passwd file. An attacker with command execution inside the container and membership in the root group can modify /etc/passwd to add a new user with arbitrary UID, including UID 0, gaining root privileges within the container. The vulnerability requires high privileges (membership in root group) and local access inside the container, with no user interaction needed. The CVSS score is 6. 4 (medium severity) reflecting the complexity and impact. While no known exploits are reported in the wild, affected organizations should prioritize patching and hardening container images to prevent privilege escalation. This issue primarily affects environments using Red Hat Fuse 7 containers, especially in enterprises relying on Red Hat middleware solutions. Countries with significant Red Hat usage and container adoption, such as the United States, Germany, Japan, United Kingdom, Canada, Australia, France, and India, are most at risk. Mitigation includes rebuilding images with correct file permissions, restricting root group membership, and applying container runtime security policies.

AI-Powered Analysis

AILast updated: 03/13/2026, 14:44:09 UTC

Technical Analysis

CVE-2025-57849 is a security vulnerability identified in Red Hat Fuse 7 container images, where the /etc/passwd file is created with group-writable permissions during the image build process. This misconfiguration allows any user who has command execution capabilities inside the container and is a member of the root group to modify the /etc/passwd file. By doing so, the attacker can add new user entries with arbitrary user IDs, including UID 0, effectively granting themselves root-level privileges within the container environment. The vulnerability arises from improper file permission settings that violate the principle of least privilege, enabling privilege escalation from a non-root user to root within the container. Exploitation requires that the attacker already have some level of access inside the container and be part of the root group, which limits the attack surface but still poses a significant risk in multi-tenant or shared container environments. The CVSS v3.1 score of 6.4 reflects a medium severity, considering the attack vector is local (AV:L), requires high privileges (PR:H), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high because gaining root privileges inside the container can lead to unauthorized data access, modification, and potential disruption of containerized services. No known exploits have been reported in the wild as of the publication date, but the vulnerability demands attention due to the widespread use of Red Hat Fuse in enterprise middleware and integration solutions. The issue can be mitigated by correcting the file permissions during image build, restricting root group membership, and enforcing container security best practices.

Potential Impact

The primary impact of CVE-2025-57849 is the potential for privilege escalation within containerized environments running Red Hat Fuse 7. An attacker who already has command execution inside the container and is a member of the root group can escalate privileges to root by modifying the /etc/passwd file. This can lead to full control over the container, allowing unauthorized access to sensitive data, modification of application behavior, and disruption of services. In multi-tenant environments or shared infrastructure, this could facilitate lateral movement or compromise of other containers or host systems if container isolation is weak. The vulnerability undermines container security assumptions and could be leveraged in complex attack chains. Although exploitation requires some pre-existing access and group membership, the impact on confidentiality, integrity, and availability within the container is severe. Organizations relying on Red Hat Fuse 7 containers for critical middleware and integration workloads face risks of data breaches, service outages, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-57849, organizations should take the following specific actions: 1) Rebuild affected Red Hat Fuse 7 container images ensuring that the /etc/passwd file is created with secure, non-group-writable permissions during the build process. 2) Audit and restrict membership of the root group within containers to the minimum necessary users, ideally avoiding non-root users in this group. 3) Implement container runtime security policies that prevent unauthorized modification of critical system files such as /etc/passwd, using tools like SELinux, AppArmor, or seccomp profiles. 4) Employ container image scanning and continuous security validation to detect insecure file permissions and privilege escalation risks before deployment. 5) Use least privilege principles for container users and avoid running containers with elevated privileges unless absolutely required. 6) Monitor container logs and behavior for suspicious activities indicative of privilege escalation attempts. 7) Stay updated with Red Hat security advisories and apply patches or updated images as they become available. These targeted measures go beyond generic advice by focusing on build-time image hygiene, group membership controls, and runtime enforcement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-08-21T14:40:40.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b41f832f860ef943ec0b50

Added to database: 3/13/2026, 2:30:27 PM

Last enriched: 3/13/2026, 2:44:09 PM

Last updated: 3/13/2026, 3:38:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses