CVE-2025-59378: CWE-669 Incorrect Resource Transfer Between Spheres in GNU Guix
In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).
AI Analysis
Technical Summary
CVE-2025-59378 is a medium-severity vulnerability affecting the guix-daemon component of GNU Guix, a functional package management tool and distribution. The flaw arises from an incorrect resource transfer between security spheres (CWE-669), specifically involving the handling of the content-addressed-mirrors file. An attacker with regular user privileges can exploit this vulnerability by writing to this file to create a setuid program. This crafted setuid program runs with the privileges of the build user, which is a higher-privileged account responsible for building packages. Notably, the elevated privileges persist even after the build process has ended, allowing the attacker to maintain unauthorized access at a higher privilege level. The vulnerability does not require user interaction or prior authentication, but it does require local access since the attack vector involves writing to a file managed by guix-daemon. The CVSS 3.1 base score is 5.7, reflecting a medium severity with low attack vector scope (local), low attack complexity, no privileges required, no user interaction, and a scope change due to privilege escalation. The impact includes limited confidentiality and integrity loss but no availability impact. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability highlights a critical mismanagement of privilege boundaries within the guix-daemon, potentially allowing unauthorized privilege escalation on affected systems.
Potential Impact
For European organizations using GNU Guix, especially those relying on it for package management and software deployment in development or production environments, this vulnerability poses a significant risk. The ability for a local user to escalate privileges to the build user can lead to unauthorized access to sensitive build environments, potentially exposing proprietary source code, build configurations, or credentials. This can undermine the integrity of software supply chains, which is a critical concern in Europe given the emphasis on secure software development and compliance with regulations such as the EU Cybersecurity Act and NIS Directive. While the vulnerability requires local access, insider threats or compromised user accounts could exploit this flaw to gain elevated privileges, facilitating further lateral movement or persistence within organizational networks. The lack of availability impact reduces the risk of service disruption, but the confidentiality and integrity risks remain significant, especially for organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running GNU Guix, enforcing strict access controls and monitoring for unauthorized file modifications, particularly to the content-addressed-mirrors file. 2) Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to limit the ability of unprivileged users to create or modify setuid binaries within the guix-daemon environment. 3) Monitor build user activities and audit file system changes related to guix-daemon to detect anomalous behavior indicative of exploitation attempts. 4) Isolate build environments using containerization or virtualization to contain potential privilege escalations. 5) Stay alert for official patches or updates from GNU Guix and apply them promptly once available. 6) Implement robust endpoint detection and response (EDR) solutions capable of identifying suspicious privilege escalation patterns. 7) Educate system administrators and developers about this vulnerability to ensure awareness and prompt response to suspicious activities. These measures go beyond generic patching advice by focusing on access control, monitoring, and environment isolation tailored to the specific exploitation vector of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-59378: CWE-669 Incorrect Resource Transfer Between Spheres in GNU Guix
Description
In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended).
AI-Powered Analysis
Technical Analysis
CVE-2025-59378 is a medium-severity vulnerability affecting the guix-daemon component of GNU Guix, a functional package management tool and distribution. The flaw arises from an incorrect resource transfer between security spheres (CWE-669), specifically involving the handling of the content-addressed-mirrors file. An attacker with regular user privileges can exploit this vulnerability by writing to this file to create a setuid program. This crafted setuid program runs with the privileges of the build user, which is a higher-privileged account responsible for building packages. Notably, the elevated privileges persist even after the build process has ended, allowing the attacker to maintain unauthorized access at a higher privilege level. The vulnerability does not require user interaction or prior authentication, but it does require local access since the attack vector involves writing to a file managed by guix-daemon. The CVSS 3.1 base score is 5.7, reflecting a medium severity with low attack vector scope (local), low attack complexity, no privileges required, no user interaction, and a scope change due to privilege escalation. The impact includes limited confidentiality and integrity loss but no availability impact. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability highlights a critical mismanagement of privilege boundaries within the guix-daemon, potentially allowing unauthorized privilege escalation on affected systems.
Potential Impact
For European organizations using GNU Guix, especially those relying on it for package management and software deployment in development or production environments, this vulnerability poses a significant risk. The ability for a local user to escalate privileges to the build user can lead to unauthorized access to sensitive build environments, potentially exposing proprietary source code, build configurations, or credentials. This can undermine the integrity of software supply chains, which is a critical concern in Europe given the emphasis on secure software development and compliance with regulations such as the EU Cybersecurity Act and NIS Directive. While the vulnerability requires local access, insider threats or compromised user accounts could exploit this flaw to gain elevated privileges, facilitating further lateral movement or persistence within organizational networks. The lack of availability impact reduces the risk of service disruption, but the confidentiality and integrity risks remain significant, especially for organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running GNU Guix, enforcing strict access controls and monitoring for unauthorized file modifications, particularly to the content-addressed-mirrors file. 2) Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to limit the ability of unprivileged users to create or modify setuid binaries within the guix-daemon environment. 3) Monitor build user activities and audit file system changes related to guix-daemon to detect anomalous behavior indicative of exploitation attempts. 4) Isolate build environments using containerization or virtualization to contain potential privilege escalations. 5) Stay alert for official patches or updates from GNU Guix and apply them promptly once available. 6) Implement robust endpoint detection and response (EDR) solutions capable of identifying suspicious privilege escalation patterns. 7) Educate system administrators and developers about this vulnerability to ensure awareness and prompt response to suspicious activities. These measures go beyond generic patching advice by focusing on access control, monitoring, and environment isolation tailored to the specific exploitation vector of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c7a873484436f1fcd044a7
Added to database: 9/15/2025, 5:47:31 AM
Last enriched: 9/15/2025, 5:47:58 AM
Last updated: 9/15/2025, 6:33:44 AM
Views: 3
Related Threats
CVE-2025-10430: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10427: Unrestricted Upload in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10426: SQL Injection in itsourcecode Online Laundry Management System
MediumCVE-2025-10425: Unrestricted Upload in 1000projects Online Student Project Report Submission and Evaluation System
MediumCVE-2025-10424: Unrestricted Upload in 1000projects Online Student Project Report Submission and Evaluation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.