Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64343: CWE-289: Authentication Bypass by Alternate Name in conda constructor

0
High
VulnerabilityCVE-2025-64343cvecve-2025-64343cwe-289
Published: Fri Nov 07 2025 (11/07/2025, 05:20:38 UTC)
Source: CVE Database V5
Vendor/Project: conda
Product: constructor

Description

(conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0.

AI-Powered Analysis

AILast updated: 11/14/2025, 09:15:10 UTC

Technical Analysis

CVE-2025-64343 is an authentication bypass vulnerability categorized under CWE-289 affecting the conda constructor tool, which is used to create installers for conda package collections. In versions 3.12.2 and earlier, the installation directory inherits permissions from its parent directory. When the parent directory is not restricted, permissions can be permissive enough to allow any authenticated local user to write to the installation directory. This means that during installation, any logged-in user can modify installation files, potentially injecting malicious code or altering the installation process. This vulnerability applies to both single-user and all-user installations. For single-user installations placed in shared directories, the permissive permissions remain after installation, extending the attack surface. The vulnerability does not require user interaction beyond being authenticated locally, and the attack vector is local, meaning an attacker must have some level of access to the system. The impact includes full compromise of confidentiality, integrity, and availability of the installed packages and potentially the host system if malicious code is executed. The issue was resolved in conda constructor version 3.13.0 by correcting the permission inheritance behavior to prevent unauthorized write access. There are no known exploits in the wild as of the publication date, but the high CVSS score of 7.8 reflects the significant risk posed by this vulnerability in multi-user environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where conda constructor is used to deploy software in shared or multi-user systems, such as research institutions, universities, and enterprises with collaborative development environments. Unauthorized modification of installation files can lead to the execution of malicious code, data breaches, or system compromise. The persistence of permissive permissions after installation in shared directories increases the risk of lateral movement and privilege escalation within networks. Confidentiality, integrity, and availability of critical software deployments can be severely impacted, potentially disrupting business operations or research activities. Organizations relying on conda for scientific computing or data analysis may face operational downtime or data integrity issues. The local nature of the attack vector means insider threats or compromised user accounts are primary concerns. Given the widespread use of conda in European academic and scientific communities, the impact could be broad if not mitigated promptly.

Mitigation Recommendations

The primary mitigation is to upgrade conda constructor to version 3.13.0 or later, where the permission inheritance issue is fixed. Organizations should audit existing installations to verify directory permissions and restrict write access to installation directories to trusted administrators only. Avoid installing conda packages in shared directories accessible by multiple users unless strict access controls are enforced. Implement file system ACLs or POSIX permissions to limit write permissions to authorized users. Regularly monitor and audit file integrity in installation directories to detect unauthorized changes. Employ endpoint protection solutions that can detect anomalous modifications to software installations. Educate users about the risks of installing software in shared locations and enforce policies that restrict local user write access. For environments where upgrading is not immediately possible, consider isolating affected systems or using containerization to limit the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d838682f4da9bb2f4364e

Added to database: 11/7/2025, 5:28:38 AM

Last enriched: 11/14/2025, 9:15:10 AM

Last updated: 12/22/2025, 6:18:15 AM

Views: 156

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2025-15014: SQL Injection in loganhong php loganSite

Medium
VulnerabilityMon Dec 22 2025

CVE-2025-12049: CWE-306: Missing Authentication for Critical Function in Sharp Display Solutions, Ltd. Media Player MP-01

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11543: CWE-354: Improper Validation of Integrity Check Value in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

CVE-2025-11542: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

High
VulnerabilityMon Dec 22 2025

CVE-2025-11541: CWE-121: Stack-based Buffer Overflow in Sharp Display Solutions, Ltd. NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

Critical
VulnerabilityMon Dec 22 2025

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats