Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5962: Improper Access Control in Red Hat Red Hat Enterprise Linux 10

0
High
VulnerabilityCVE-2025-5962cvecve-2025-5962
Published: Mon Sep 22 2025 (09/22/2025, 08:04:39 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the Lightspeed history service. Insufficient access controls allow a local, unprivileged user to access and manipulate the chat history of another user on the same system. By abusing inter-process communication calls to the history service, an attacker can view, delete, or inject arbitrary history entries, including misleading or malicious commands. This can be used to deceive another user into executing harmful actions, posing a risk of privilege misuse or unauthorized command execution through social engineering.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:47:18 UTC

Technical Analysis

CVE-2025-5962 identifies an improper access control vulnerability in the Lightspeed history service component of Red Hat Enterprise Linux 10. The flaw arises from insufficient enforcement of access permissions on inter-process communication (IPC) calls to the history service, which manages chat history data. A local attacker without privileges can exploit this by interacting with the IPC interface to read, delete, or inject arbitrary entries into another user's chat history. This manipulation can include inserting misleading or malicious commands that, when executed by the victim, could lead to unauthorized actions or privilege escalation through social engineering. The vulnerability impacts confidentiality and integrity of user data but does not affect system availability. The CVSS 3.1 base score is 7.7, reflecting high severity due to the ease of local exploitation without authentication or user interaction. Although no public exploits are known, the potential for misuse in multi-user environments is significant, especially in shared or enterprise systems where users rely on command history for operational tasks. The vulnerability underscores the need for robust access control on IPC mechanisms and secure handling of user data within system services.

Potential Impact

The vulnerability allows local attackers to compromise the confidentiality and integrity of user chat history on affected systems. By injecting malicious commands into another user's history, attackers can deceive users into executing harmful actions, potentially leading to privilege misuse or unauthorized command execution. This can facilitate lateral movement within an organization’s infrastructure or lead to further compromise of sensitive systems. The impact is particularly severe in multi-user environments such as enterprise servers, development workstations, or shared computing resources where multiple users operate concurrently. Although availability is not directly affected, the trustworthiness of user command histories is undermined, which can disrupt operational workflows and increase the risk of social engineering attacks. Organizations relying on Red Hat Enterprise Linux 10 for critical operations may face increased risk of insider threats or local privilege escalation attempts if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-5962, organizations should apply any available patches from Red Hat promptly once released. In the absence of patches, restrict local user access to systems running Red Hat Enterprise Linux 10 to trusted personnel only. Implement strict user account segregation and minimize the number of users with local shell access. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to enforce fine-grained IPC permissions and restrict access to the Lightspeed history service. Monitor system logs for unusual IPC activity or unexpected modifications to user history files. Educate users about the risks of executing commands from untrusted history entries and encourage verification of commands before execution. Consider disabling or isolating the Lightspeed history service if it is not essential to operations. Regularly audit local user permissions and IPC interfaces to ensure compliance with security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-10T06:06:36.103Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d103c34b809de657261e16

Added to database: 9/22/2025, 8:07:31 AM

Last enriched: 2/27/2026, 3:47:18 PM

Last updated: 3/26/2026, 9:18:02 AM

Views: 173

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses