Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5791: Incorrect Privilege Assignment

0
High
VulnerabilityCVE-2025-5791cvecve-2025-5791
Published: Fri Jun 06 2025 (06/06/2025, 13:10:07 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift sandboxed containers 1.1

Description

A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.

AI-Powered Analysis

AILast updated: 11/20/2025, 08:44:46 UTC

Technical Analysis

CVE-2025-5791 is a vulnerability discovered in the Rust user's crate version 0.8.0, which is used within Red Hat OpenShift sandboxed containers 1.1. The flaw arises from an incorrect privilege assignment mechanism related to group membership enumeration. Specifically, when a user or process has fewer than exactly 1024 groups, the system erroneously includes the root group in the access list. This incorrect group listing leads to privilege escalation, granting unauthorized root group access to processes or users that should not have it. The vulnerability does not require user interaction but does require local access with limited privileges (AV:L, PR:L, UI:N). The impact is high on confidentiality and integrity, as unauthorized root group membership can allow attackers to access sensitive data and modify system configurations within the container environment. The vulnerability affects containerized workloads running on Red Hat OpenShift 1.1 that use the vulnerable Rust crate. Although no known exploits are currently in the wild, the flaw's nature makes it a significant risk for environments relying on strict privilege separation. The CVSS 3.1 score of 7.1 reflects the high impact and relatively low complexity of exploitation, emphasizing the need for timely remediation. The vulnerability was published on June 6, 2025, and is assigned by Red Hat. No patches or exploit indicators are currently listed, indicating that organizations should monitor vendor advisories closely for updates.

Potential Impact

For European organizations, this vulnerability poses a significant risk to containerized environments, particularly those using Red Hat OpenShift 1.1 with the affected Rust crate. Unauthorized root group access can lead to privilege escalation within containers, potentially allowing attackers to access or modify sensitive data, disrupt container workloads, or pivot to other parts of the network. This can compromise confidentiality and integrity of critical applications and data. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely heavily on container orchestration and Red Hat OpenShift are especially vulnerable. The flaw could also undermine compliance with data protection regulations like GDPR if unauthorized access leads to data breaches. Since exploitation requires local access, insider threats or compromised user accounts pose a higher risk. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity demands urgent attention to prevent potential exploitation.

Mitigation Recommendations

1. Monitor Red Hat and Rust crate vendor advisories for official patches addressing CVE-2025-5791 and apply them promptly once available. 2. Until patches are released, restrict local access to systems running vulnerable OpenShift containers to trusted personnel only. 3. Audit group memberships within container environments to detect any unauthorized root group inclusions. 4. Implement strict container runtime security policies that limit privilege escalation and enforce least privilege principles. 5. Use container security tools to monitor for anomalous privilege changes or unexpected group assignments. 6. Consider isolating critical workloads in separate namespaces or clusters to limit the blast radius of potential privilege escalations. 7. Educate system administrators and DevOps teams about the vulnerability and encourage vigilance for suspicious local activity. 8. Regularly review and update container images and dependencies to reduce exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-06T08:09:10.242Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842f14871f4d251b5c95e7e

Added to database: 6/6/2025, 1:46:48 PM

Last enriched: 11/20/2025, 8:44:46 AM

Last updated: 11/20/2025, 3:51:24 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats