CVE-2025-64343: CWE-289: Authentication Bypass by Alternate Name in conda constructor
(conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0.
AI Analysis
Technical Summary
CVE-2025-64343 is an authentication bypass vulnerability categorized under CWE-289 affecting the conda constructor tool, which is used to create installers for conda package collections. In versions 3.12.2 and earlier, the installation directory inherits permissions from its parent directory. When the parent directory is not restricted, permissions can be permissive enough to allow any authenticated local user to write to the installation directory. This means that during installation, any logged-in user can modify installation files, potentially injecting malicious code or altering the installation process. This vulnerability applies to both single-user and all-user installations. For single-user installations placed in shared directories, the permissive permissions remain after installation, extending the attack surface. The vulnerability does not require user interaction beyond being authenticated locally, and the attack vector is local, meaning an attacker must have some level of access to the system. The impact includes full compromise of confidentiality, integrity, and availability of the installed packages and potentially the host system if malicious code is executed. The issue was resolved in conda constructor version 3.13.0 by correcting the permission inheritance behavior to prevent unauthorized write access. There are no known exploits in the wild as of the publication date, but the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability in multi-user environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where conda constructor is used to deploy software in shared or multi-user systems, such as research institutions, universities, and enterprises with collaborative development environments. Unauthorized modification of installation files can lead to the execution of malicious code, data breaches, or system compromise. The persistence of permissive permissions after installation in shared directories increases the risk of lateral movement and privilege escalation within networks. Confidentiality, integrity, and availability of critical software deployments can be severely impacted, potentially disrupting business operations or research activities. Organizations relying on conda for scientific computing or data analysis may face operational downtime or data integrity issues. The local nature of the attack vector means insider threats or compromised user accounts are primary concerns. Given the widespread use of conda in European academic and scientific communities, the impact could be broad if not mitigated promptly.
Mitigation Recommendations
The primary mitigation is to upgrade conda constructor to version 3.13.0 or later, where the permission inheritance issue is fixed. Organizations should audit existing installations to verify directory permissions and restrict write access to installation directories to trusted administrators only. Avoid installing conda packages in shared directories accessible by multiple users unless strict access controls are enforced. Implement file system ACLs or POSIX permissions to limit write permissions to authorized users. Regularly monitor and audit file integrity in installation directories to detect unauthorized changes. Employ endpoint protection solutions that can detect anomalous modifications to software installations. Educate users about the risks of installing software in shared locations and enforce policies that restrict local user write access. For environments where upgrading is not immediately possible, consider isolating affected systems or using containerization to limit the impact of potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Italy
CVE-2025-64343: CWE-289: Authentication Bypass by Alternate Name in conda constructor
Description
(conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64343 is an authentication bypass vulnerability categorized under CWE-289 affecting the conda constructor tool, which is used to create installers for conda package collections. In versions 3.12.2 and earlier, the installation directory inherits permissions from its parent directory. When the parent directory is not restricted, permissions can be permissive enough to allow any authenticated local user to write to the installation directory. This means that during installation, any logged-in user can modify installation files, potentially injecting malicious code or altering the installation process. This vulnerability applies to both single-user and all-user installations. For single-user installations placed in shared directories, the permissive permissions remain after installation, extending the attack surface. The vulnerability does not require user interaction beyond being authenticated locally, and the attack vector is local, meaning an attacker must have some level of access to the system. The impact includes full compromise of confidentiality, integrity, and availability of the installed packages and potentially the host system if malicious code is executed. The issue was resolved in conda constructor version 3.13.0 by correcting the permission inheritance behavior to prevent unauthorized write access. There are no known exploits in the wild as of the publication date, but the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability in multi-user environments.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where conda constructor is used to deploy software in shared or multi-user systems, such as research institutions, universities, and enterprises with collaborative development environments. Unauthorized modification of installation files can lead to the execution of malicious code, data breaches, or system compromise. The persistence of permissive permissions after installation in shared directories increases the risk of lateral movement and privilege escalation within networks. Confidentiality, integrity, and availability of critical software deployments can be severely impacted, potentially disrupting business operations or research activities. Organizations relying on conda for scientific computing or data analysis may face operational downtime or data integrity issues. The local nature of the attack vector means insider threats or compromised user accounts are primary concerns. Given the widespread use of conda in European academic and scientific communities, the impact could be broad if not mitigated promptly.
Mitigation Recommendations
The primary mitigation is to upgrade conda constructor to version 3.13.0 or later, where the permission inheritance issue is fixed. Organizations should audit existing installations to verify directory permissions and restrict write access to installation directories to trusted administrators only. Avoid installing conda packages in shared directories accessible by multiple users unless strict access controls are enforced. Implement file system ACLs or POSIX permissions to limit write permissions to authorized users. Regularly monitor and audit file integrity in installation directories to detect unauthorized changes. Employ endpoint protection solutions that can detect anomalous modifications to software installations. Educate users about the risks of installing software in shared locations and enforce policies that restrict local user write access. For environments where upgrading is not immediately possible, consider isolating affected systems or using containerization to limit the impact of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.031Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690d838682f4da9bb2f4364e
Added to database: 11/7/2025, 5:28:38 AM
Last enriched: 11/14/2025, 9:15:10 AM
Last updated: 12/22/2025, 6:18:15 AM
Views: 156
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15014: SQL Injection in loganhong php loganSite
MediumCVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01
CriticalCVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalCVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
HighCVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.