Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57852: Incorrect Default Permissions in Red Hat Red Hat OpenShift AI 2.16

0
Medium
VulnerabilityCVE-2025-57852cvecve-2025-57852
Published: Tue Sep 30 2025 (09/30/2025, 14:37:10 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift AI 2.16

Description

A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 20:37:48 UTC

Technical Analysis

CVE-2025-57852 identifies a security vulnerability in Red Hat OpenShift AI version 2.16, specifically within the KServe ModelMesh container images. The root cause is the incorrect default permissions assigned to the /etc/passwd file during the container image build process, where the file is created with group-writable permissions. This misconfiguration allows any user who has command execution capability inside the container and belongs to the root group to modify the /etc/passwd file. By altering this file, an attacker can add a new user entry with any arbitrary user identifier (UID), including UID 0, which corresponds to the root user. This effectively enables privilege escalation from a non-root user to root within the container environment. The vulnerability requires that the attacker already has some level of command execution inside the container and membership in the root group, which implies a prerequisite level of access. No user interaction is necessary to exploit this flaw. The CVSS v3.1 base score is 6.4, reflecting a medium severity rating due to the high impact on confidentiality, integrity, and availability within the container, but mitigated by the requirement for high privileges and local access. There are no known exploits in the wild at the time of publication. The vulnerability highlights the importance of secure container image build practices, particularly ensuring that critical system files like /etc/passwd have restrictive permissions to prevent unauthorized modification. This issue is specific to Red Hat OpenShift AI 2.16 and the KServe ModelMesh container images, which are used in AI model serving within OpenShift environments.

Potential Impact

The vulnerability allows an attacker with limited privileges inside a container to escalate to root privileges by modifying the /etc/passwd file due to improper file permissions. This can lead to full container compromise, enabling the attacker to execute arbitrary code as root, potentially affecting the confidentiality, integrity, and availability of applications running within the container. In multi-tenant OpenShift environments, this could facilitate lateral movement or privilege escalation to other containers or the host if additional misconfigurations exist. The impact is significant for organizations relying on Red Hat OpenShift AI 2.16 for AI model deployment and serving, as compromised containers could lead to data breaches, service disruption, or unauthorized access to sensitive AI workloads. However, the requirement for existing command execution and root group membership limits the ease of exploitation, reducing the likelihood of widespread exploitation without prior access. Still, the vulnerability poses a risk in environments where container security boundaries are critical and where attackers may already have footholds.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Apply any available patches or updates from Red Hat for OpenShift AI 2.16 and KServe ModelMesh container images as soon as they are released. 2) Review and harden container image build processes to ensure that critical system files such as /etc/passwd are created with secure, non-group-writable permissions. 3) Limit membership of the root group within containers to only trusted processes and users to reduce the risk of privilege escalation. 4) Implement strict container runtime security policies that restrict command execution capabilities and group memberships. 5) Employ container security tools to scan images for insecure file permissions and configurations before deployment. 6) Monitor container environments for unusual modifications to system files and privilege escalation attempts. 7) Consider using container security features such as SELinux, AppArmor, or seccomp profiles to limit the impact of potential exploits. 8) Educate development and operations teams on secure container image creation and privilege management best practices. These steps will reduce the attack surface and help prevent exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-08-21T14:40:40.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dbf9a6e965c789fc619920

Added to database: 9/30/2025, 3:39:18 PM

Last enriched: 3/7/2026, 8:37:48 PM

Last updated: 3/26/2026, 9:22:25 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses