Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65807: n/a

0
High
VulnerabilityCVE-2025-65807cvecve-2025-65807
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in sd command v1.0.0 and before allows attackers to escalate privileges to root via a crafted command.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:06:36 UTC

Technical Analysis

CVE-2025-65807 is a vulnerability identified in the 'sd' command version 1.0.0 and earlier, which allows attackers to escalate privileges to root by executing a crafted command. The root cause is improper access control (CWE-266), meaning the command does not correctly enforce privilege boundaries, enabling unauthorized privilege escalation. The CVSS v3.1 score of 8.4 reflects a high-severity issue with local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating a full compromise of the affected system is possible. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk because an attacker with local access can gain root privileges, potentially leading to complete system control. The lack of published patches increases the urgency for organizations to implement interim mitigations. The vulnerability was reserved on 2025-11-18 and published on 2025-12-10, indicating recent discovery and disclosure. The 'sd' command is commonly found in Unix-like environments, making systems running Linux or similar OSes potential targets. The absence of patch links suggests vendors have not yet released fixes, so organizations must rely on access controls and monitoring to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a critical risk to systems running the vulnerable 'sd' command, particularly in environments where local user access is possible, such as shared servers, developer workstations, or multi-user systems. Successful exploitation leads to root privilege escalation, enabling attackers to bypass security controls, access sensitive data, modify system configurations, install persistent malware, or disrupt services. This can result in data breaches, operational downtime, and loss of trust. Critical infrastructure, government agencies, and enterprises relying on Unix-like systems are especially vulnerable. The high impact on confidentiality, integrity, and availability means that exploitation could have severe consequences for compliance with European data protection regulations such as GDPR. Additionally, the lack of known exploits in the wild currently provides a window for proactive defense, but the ease of exploitation once local access is gained means insider threats or attackers leveraging other vulnerabilities to gain local access could quickly escalate privileges.

Mitigation Recommendations

1. Restrict local access to systems running the 'sd' command to trusted users only, employing strict user account management and least privilege principles. 2. Monitor system logs and user activities for unusual command executions or privilege escalations, using advanced endpoint detection and response (EDR) tools tailored for Unix-like systems. 3. Implement mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of processes to escalate privileges even if exploited. 4. Isolate critical systems and limit network access to reduce the risk of attackers gaining local access. 5. Regularly audit installed software versions and configurations to identify and inventory vulnerable 'sd' command instances. 6. Engage with vendors or open-source communities to track patch releases and apply updates promptly once available. 7. Consider temporary workarounds such as removing or restricting execution permissions of the vulnerable 'sd' command if feasible without disrupting operations. 8. Educate system administrators and users about the risk and signs of exploitation to enhance detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939921d86adcdec9b0f4b8c

Added to database: 12/10/2025, 3:30:37 PM

Last enriched: 12/17/2025, 4:06:36 PM

Last updated: 2/6/2026, 2:41:44 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats