Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62596: CWE-61: UNIX Symbolic Link (Symlink) Following in youki-dev youki

0
High
VulnerabilityCVE-2025-62596cvecve-2025-62596cwe-61cwe-363
Published: Wed Nov 05 2025 (11/05/2025, 23:14:37 UTC)
Source: CVE Database V5
Vendor/Project: youki-dev
Product: youki

Description

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

AI-Powered Analysis

AILast updated: 11/05/2025, 23:38:26 UTC

Technical Analysis

CVE-2025-62596 is a vulnerability identified in youki, a container runtime written in Rust, specifically affecting versions 0.5.6 and below. The root cause lies in the apparmor handling component of youki, which performs insufficiently strict validation of write targets. This weakness, when combined with pathname resolution that follows symbolic links, allows an attacker to exploit a race condition during path resolution. The attack involves substituting intermediate path components in a shared mount environment, redirecting the final write target to unintended procfs locations. Procfs is a virtual filesystem exposing kernel and process information, and unauthorized writes here can lead to privilege escalation, manipulation of kernel parameters, or disruption of system processes. The vulnerability is classified under CWE-61 (Improper Handling of Symbolic Links) and CWE-363 (Race Condition). Exploitation requires local access with low privileges, partial user interaction, and leverages a timing window during pathname resolution. The CVSS 4.0 score is 7.3 (high severity), reflecting the complexity of exploitation but significant impact on confidentiality, integrity, and availability. The issue is fixed in youki version 0.5.7, which enforces stricter write-target validation and mitigates the race condition. No known exploits are reported in the wild as of publication, but the vulnerability poses a serious risk to containerized environments relying on youki for runtime operations.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those deploying containerized applications using youki as the runtime. Successful exploitation can lead to unauthorized writes to procfs, potentially allowing attackers to escalate privileges, alter kernel parameters, or disrupt container and host system operations. This could compromise sensitive data confidentiality, integrity of container workloads, and availability of critical services. Organizations in sectors such as finance, healthcare, telecommunications, and critical infrastructure that increasingly rely on containerization for agility and scalability are at heightened risk. The requirement for local access and user interaction somewhat limits remote exploitation but insider threats or compromised user accounts could leverage this vulnerability. Additionally, the complexity of the attack involving race conditions and symlink manipulation means that skilled adversaries, including advanced persistent threat (APT) groups, could weaponize this flaw to gain persistent footholds or disrupt operations. The impact extends to cloud providers and managed service providers in Europe offering container orchestration services with youki, potentially affecting multiple tenants.

Mitigation Recommendations

The primary mitigation is to upgrade all youki deployments to version 0.5.7 or later, where the vulnerability is fixed by enforcing stricter write-target validation and eliminating the race condition. Organizations should audit their container runtimes to identify any instances of youki versions below 0.5.7. Additionally, implement strict local user access controls to limit who can execute or interact with container runtimes, reducing the risk of local exploitation. Employ mandatory access control (MAC) policies, such as enhanced apparmor or SELinux profiles, to restrict write permissions to procfs and other sensitive filesystem locations. Monitor system logs and container runtime events for unusual write attempts to procfs or suspicious pathname resolution activities. Conduct regular security assessments and penetration testing focusing on container environments to detect potential exploitation attempts. For environments where immediate upgrade is not feasible, consider isolating youki containers in hardened sandboxes and limiting shared mount points to reduce the attack surface. Finally, educate system administrators and developers about the risks of symlink race conditions and secure coding practices in container runtimes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-16T19:24:37.266Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690bdc882de49fb2b5990aa2

Added to database: 11/5/2025, 11:23:52 PM

Last enriched: 11/5/2025, 11:38:26 PM

Last updated: 11/6/2025, 9:12:08 AM

Views: 1043

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats