Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64750: CWE-61: UNIX Symbolic Link (Symlink) Following in sylabs singularity

0
Medium
VulnerabilityCVE-2025-64750cvecve-2025-64750cwe-61cwe-706
Published: Tue Dec 02 2025 (12/02/2025, 17:25:55 UTC)
Source: CVE Database V5
Vendor/Project: sylabs
Product: singularity

Description

SingularityCE and SingularityPRO are open source container platforms. Prior to SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5, if a user relies on LSM restrictions to prevent malicious operations then, under certain circumstances, an attacker can redirect the LSM label write operation so that it is ineffective. The attacker must cause the user to run a malicious container image that redirects the mount of /proc to the destination of a shared mount, either known to be configured on the target system, or that will be specified by the user when running the container. The attacker must also control the content of the shared mount, for example through another malicious container which also binds it, or as a user with relevant permissions on the host system it is bound from. This vulnerability is fixed in SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5.

AI-Powered Analysis

AILast updated: 12/02/2025, 17:51:36 UTC

Technical Analysis

CVE-2025-64750 is a vulnerability in Sylabs Singularity container platforms (SingularityCE and SingularityPRO) that allows an attacker to bypass Linux Security Module (LSM) restrictions by exploiting symbolic link following behavior. The issue arises when a user relies on LSM to prevent malicious operations within containers. An attacker can craft a malicious container image that remounts the /proc filesystem inside the container to a shared mount point. This shared mount must be either pre-configured on the target system or specified by the user at container runtime. The attacker must control the contents of this shared mount, which can be achieved by running another malicious container that binds the same mount or by having relevant permissions on the host system. By redirecting the LSM label write operation through this manipulated mount, the attacker effectively renders LSM restrictions ineffective, potentially allowing unauthorized operations within the container environment. The vulnerability affects SingularityCE versions greater than 4.2.0-rc.1 but less than 4.3.5, and SingularityPRO versions less than 4.1.11 and 4.3.5. The CVSS v3.1 base score is 4.5 (medium severity), reflecting local attack vector, high attack complexity, no privileges required, user interaction required, and limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild. The issue was addressed in SingularityCE 4.3.5 and SingularityPRO 4.1.11 and 4.3.5.

Potential Impact

For European organizations, especially those in scientific research, high-performance computing (HPC), and academic institutions that rely on Singularity containers for workload portability and security, this vulnerability poses a risk of bypassing LSM-based security controls. This could lead to unauthorized access or modification of containerized workloads, potentially exposing sensitive data or disrupting critical computations. Although the impact is limited by the requirement for local access and user interaction, the ability to circumvent security restrictions undermines trust in container isolation. This could facilitate lateral movement or privilege escalation within multi-tenant HPC clusters or shared research environments. The vulnerability may also affect organizations using Singularity in production environments for containerized applications, increasing the risk of data leakage or service disruption. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments where attackers have insider access or where malicious container images could be introduced.

Mitigation Recommendations

European organizations should immediately upgrade affected SingularityCE versions to 4.3.5 or later and SingularityPRO versions to 4.1.11 or later to obtain the official patch. Until upgrades are applied, restrict the use of shared mounts that can be manipulated by untrusted users or containers. Implement strict access controls on host systems to prevent unauthorized users from binding or modifying shared mounts. Enforce container image provenance and scanning policies to prevent running malicious container images. Limit user permissions to reduce the ability to specify arbitrary shared mounts at container runtime. Monitor container runtime logs and host filesystem mounts for suspicious remounting of /proc or unusual symlink activity. Consider additional runtime security tools that enforce mandatory access controls beyond LSM or provide container isolation verification. Educate users about the risks of running untrusted container images and the importance of following security best practices in containerized environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T22:29:34.873Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692f23d63286267b25e270f7

Added to database: 12/2/2025, 5:37:26 PM

Last enriched: 12/2/2025, 5:51:36 PM

Last updated: 12/2/2025, 6:39:37 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats