Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57849: Incorrect Default Permissions in Red Hat Red Hat Fuse 7

0
Medium
VulnerabilityCVE-2025-57849cvecve-2025-57849
Published: Fri Mar 13 2026 (03/13/2026, 03:08:32 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Fuse 7

Description

A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 14:44:09 UTC

Technical Analysis

CVE-2025-57849 is a security vulnerability identified in Red Hat Fuse 7 container images, where the /etc/passwd file is created with group-writable permissions during the image build process. This misconfiguration allows any user who has command execution capabilities inside the container and is a member of the root group to modify the /etc/passwd file. By doing so, the attacker can add new user entries with arbitrary user IDs, including UID 0, effectively granting themselves root-level privileges within the container environment. The vulnerability arises from improper file permission settings that violate the principle of least privilege, enabling privilege escalation from a non-root user to root within the container. Exploitation requires that the attacker already have some level of access inside the container and be part of the root group, which limits the attack surface but still poses a significant risk in multi-tenant or shared container environments. The CVSS v3.1 score of 6.4 reflects a medium severity, considering the attack vector is local (AV:L), requires high privileges (PR:H), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high because gaining root privileges inside the container can lead to unauthorized data access, modification, and potential disruption of containerized services. No known exploits have been reported in the wild as of the publication date, but the vulnerability demands attention due to the widespread use of Red Hat Fuse in enterprise middleware and integration solutions. The issue can be mitigated by correcting the file permissions during image build, restricting root group membership, and enforcing container security best practices.

Potential Impact

The primary impact of CVE-2025-57849 is the potential for privilege escalation within containerized environments running Red Hat Fuse 7. An attacker who already has command execution inside the container and is a member of the root group can escalate privileges to root by modifying the /etc/passwd file. This can lead to full control over the container, allowing unauthorized access to sensitive data, modification of application behavior, and disruption of services. In multi-tenant environments or shared infrastructure, this could facilitate lateral movement or compromise of other containers or host systems if container isolation is weak. The vulnerability undermines container security assumptions and could be leveraged in complex attack chains. Although exploitation requires some pre-existing access and group membership, the impact on confidentiality, integrity, and availability within the container is severe. Organizations relying on Red Hat Fuse 7 containers for critical middleware and integration workloads face risks of data breaches, service outages, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-57849, organizations should take the following specific actions: 1) Rebuild affected Red Hat Fuse 7 container images ensuring that the /etc/passwd file is created with secure, non-group-writable permissions during the build process. 2) Audit and restrict membership of the root group within containers to the minimum necessary users, ideally avoiding non-root users in this group. 3) Implement container runtime security policies that prevent unauthorized modification of critical system files such as /etc/passwd, using tools like SELinux, AppArmor, or seccomp profiles. 4) Employ container image scanning and continuous security validation to detect insecure file permissions and privilege escalation risks before deployment. 5) Use least privilege principles for container users and avoid running containers with elevated privileges unless absolutely required. 6) Monitor container logs and behavior for suspicious activities indicative of privilege escalation attempts. 7) Stay updated with Red Hat security advisories and apply patches or updated images as they become available. These targeted measures go beyond generic advice by focusing on build-time image hygiene, group membership controls, and runtime enforcement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-08-21T14:40:40.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b41f832f860ef943ec0b50

Added to database: 3/13/2026, 2:30:27 PM

Last enriched: 3/13/2026, 2:44:09 PM

Last updated: 4/27/2026, 5:19:25 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses