Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59054: CWE-552: Files or Directories Accessible to External Parties in Dstack-TEE dstack

0
High
VulnerabilityCVE-2025-59054cvecve-2025-59054cwe-552
Published: Fri Sep 12 2025 (09/12/2025, 13:01:02 UTC)
Source: CVE Database V5
Vendor/Project: Dstack-TEE
Product: dstack

Description

dstack is a software development kit (SDK) to simplify the deployment of arbitrary containerized apps into trusted execution environments. In versions of dstack prior to 0.5.4, a malicious host may provide a crafted LUKS2 data volume to a dstack CVM for use as the `/data` mount. The guest will open the volume and write secret data using a volume key known to the attacker, causing disclosure of Wireguard keys and other secret information. The attacker can also pre-load data on the device, which could potentially compromise guest execution. LUKS2 volume metadata is not authenticated and supports null key-encryption algorithms, allowing an attacker to create a volume such that the volume opens (cryptsetup open) without error using any passphrase or token, records all writes in plaintext (or ciphertext with an attacker-known key), and/or contains arbitrary data chosen by the attacker. Version 0.5.4 of dstack contains a patch that addresses LUKS headers.

AI-Powered Analysis

AILast updated: 11/28/2025, 22:35:13 UTC

Technical Analysis

The vulnerability CVE-2025-59054 affects dstack, an SDK designed to deploy containerized applications into trusted execution environments (TEEs). In versions before 0.5.4, the vulnerability allows a malicious host to supply a specially crafted LUKS2 encrypted data volume as the `/data` mount for a dstack Confidential Virtual Machine (CVM) guest. LUKS2 volumes are used to encrypt data, but their metadata is not authenticated and supports null key-encryption algorithms. This flaw enables an attacker to create a volume that opens without error regardless of the passphrase, records all guest writes in plaintext or ciphertext with a key known to the attacker, and preload arbitrary data. When the guest writes secret information such as Wireguard keys to this volume, the attacker gains access to these secrets, compromising confidentiality. Furthermore, preloading data can potentially alter guest execution, threatening integrity. The vulnerability requires the attacker to control the host environment but does not require guest authentication or user interaction, making it a local privilege escalation and data disclosure risk. The issue was addressed in dstack version 0.5.4 by patching the handling of LUKS headers to ensure metadata authentication and prevent null key-encryption misuse. No known exploits are reported in the wild as of publication. The CVSS 4.0 vector indicates local attack vector, low complexity, no privileges or user interaction needed, with high impact on confidentiality and integrity but no impact on availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data processed within dstack-based TEEs. Organizations using dstack to deploy containerized applications that handle sensitive workloads—such as financial institutions, healthcare providers, and government agencies—may inadvertently expose cryptographic keys (e.g., Wireguard VPN keys) and other secrets to malicious insiders or compromised hosts. This could lead to unauthorized network access, data breaches, and potential lateral movement within internal networks. The ability to preload arbitrary data further raises the risk of guest environment compromise, potentially allowing attackers to execute malicious code or disrupt critical services. Given the increasing adoption of TEEs for secure application deployment in Europe, this vulnerability could undermine trust in these environments and lead to regulatory compliance issues, especially under GDPR where data protection is paramount. The local attack vector means that attackers must have some level of host access, which may be feasible in multi-tenant cloud or shared infrastructure scenarios common in European data centers.

Mitigation Recommendations

European organizations should immediately upgrade all dstack deployments to version 0.5.4 or later, which includes the patch addressing LUKS header authentication and null key-encryption misuse. Until upgrades are applied, restrict host-level access to trusted administrators only and monitor for unusual volume mounts or LUKS2 volume usage patterns. Implement strict host integrity verification and runtime monitoring to detect unauthorized volume manipulations. Consider isolating dstack hosts in hardened environments with minimal attack surface and enforce strong host access controls and auditing. Additionally, review and rotate all cryptographic keys (e.g., Wireguard keys) that may have been exposed due to this vulnerability. For environments where upgrading is not immediately possible, avoid using LUKS2 encrypted volumes as `/data` mounts or use alternative secure storage mechanisms that enforce metadata authentication. Finally, incorporate this vulnerability into incident response plans and threat hunting activities to detect potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.173Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c431af701e2b3019751c11

Added to database: 9/12/2025, 2:43:59 PM

Last enriched: 11/28/2025, 10:35:13 PM

Last updated: 12/13/2025, 5:53:44 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats