Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64343: CWE-289: Authentication Bypass by Alternate Name in conda constructor

0
High
VulnerabilityCVE-2025-64343cvecve-2025-64343cwe-289
Published: Fri Nov 07 2025 (11/07/2025, 05:20:38 UTC)
Source: CVE Database V5
Vendor/Project: conda
Product: constructor

Description

(conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0.

AI-Powered Analysis

AILast updated: 11/07/2025, 05:28:50 UTC

Technical Analysis

CVE-2025-64343 is a vulnerability in the conda constructor tool, which is used to create installers for conda package collections. Versions 3.12.2 and earlier suffer from an authentication bypass issue due to the way installation directory permissions are inherited from the parent directory. When the parent directory has permissive permissions, such as write access for authenticated users, any logged-in user can modify the installation files during the installation process. This applies to both single-user and all-user installations. In shared directory environments, the permissive permissions persist after installation, allowing ongoing unauthorized modifications. The vulnerability is classified under CWE-289 (Authentication Bypass by Alternate Name) because it effectively allows users with limited privileges to bypass intended access controls by exploiting directory permission inheritance. The CVSS v3.1 base score is 7.8 (high), reflecting the local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild, the vulnerability poses a significant risk in multi-user environments where conda constructor is used. The issue is resolved in conda constructor version 3.13.0, which presumably corrects the permission inheritance behavior to prevent unauthorized write access during and after installation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized local users modifying conda package installers or installed software, potentially injecting malicious code or disrupting software functionality. This compromises confidentiality, integrity, and availability of software environments relying on conda constructor. Organizations with shared systems or multi-user environments, such as universities, research institutions, and enterprises using conda for data science or software deployment, are particularly at risk. The persistence of permissive permissions after installation in shared directories increases the risk of ongoing unauthorized access and tampering. This could facilitate privilege escalation, supply chain compromise, or lateral movement within networks. The impact is heightened in environments where conda packages are used to deploy critical applications or sensitive data processing pipelines. Given the widespread use of conda in scientific and development communities across Europe, the vulnerability could affect a broad range of sectors including academia, healthcare, finance, and technology.

Mitigation Recommendations

European organizations should immediately upgrade conda constructor to version 3.13.0 or later to remediate the vulnerability. Until upgrades are applied, restrict write permissions on parent directories used for conda installations to trusted administrators only, preventing unauthorized users from modifying installation directories. Implement strict access controls and auditing on shared directories where conda is installed. Use filesystem permissions and access control lists (ACLs) to enforce least privilege principles. Consider isolating conda installations to user-specific directories with controlled access rather than shared locations. Regularly monitor and verify integrity of installed conda packages and installers to detect unauthorized changes. Incorporate this vulnerability into local security awareness and incident response plans, emphasizing the risk of local privilege escalation via installation tampering. Finally, maintain up-to-date inventories of conda constructor versions deployed across the organization to ensure timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d838682f4da9bb2f4364e

Added to database: 11/7/2025, 5:28:38 AM

Last enriched: 11/7/2025, 5:28:50 AM

Last updated: 11/8/2025, 2:15:27 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats