CVE-2026-25701: CWE-377: Insecure Temporary File in openSUSE sdbootutil
An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored. * overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak. This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.
AI Analysis
Technical Summary
CVE-2026-25701 is an insecure temporary file vulnerability classified under CWE-377 affecting the sdbootutil utility in openSUSE Linux distributions. The flaw allows local users with limited privileges to pre-create directories that sdbootutil uses insecurely during its operations. This can lead to multiple malicious outcomes: unauthorized access to potentially sensitive information stored in /var/lib/pcrlock.d, manipulation of backup data in /tmp/pcrlock.d.bak compromising data integrity, and overwriting of protected system files by exploiting symbolic link (symlink) attacks within the temporary backup directory. The vulnerability stems from insufficient validation and secure handling of temporary files and directories, enabling attackers to influence file system operations. The CVSS 4.0 score of 7.0 (high severity) reflects the vulnerability’s local attack vector, low complexity, no required authentication, and significant impact on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability poses a serious risk to systems running vulnerable versions of sdbootutil, especially in environments where local user access is possible. The affected versions are not explicitly specified but include all versions prior to commit 5880246d3a02642dc68f5c8cb474bf63cdb56bca. The issue was published on February 25, 2026, and is currently unpatched. Organizations relying on openSUSE should monitor for updates and assess local user permissions carefully.
Potential Impact
The vulnerability allows local attackers to compromise confidentiality by accessing private information in /var/lib/pcrlock.d. It also threatens data integrity by enabling manipulation of backup data in /tmp/pcrlock.d.bak, which could lead to corrupted or maliciously altered system states upon restoration. Additionally, the ability to overwrite protected system files via symlink attacks could result in privilege escalation or system instability, impacting availability. The scope is limited to local users but can be critical in multi-user environments or where untrusted users have shell access. Exploitation does not require user interaction or elevated privileges beyond local access, increasing the risk in shared or poorly secured systems. The overall impact includes potential unauthorized data disclosure, system compromise, and disruption of normal system operations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Apply patches or updates from openSUSE as soon as they become available to fix the insecure temporary file handling in sdbootutil. 2) Restrict local user access to systems running vulnerable versions, especially limiting shell or terminal access to trusted users only. 3) Implement strict file system permissions and use mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized creation or manipulation of directories and symlinks in sensitive paths such as /tmp and /var/lib. 4) Monitor system logs for unusual file system activity related to /tmp/pcrlock.d.bak and /var/lib/pcrlock.d to detect potential exploitation attempts. 5) Consider using filesystem namespaces or containerization to isolate processes that use sdbootutil, reducing the risk of local privilege abuse. 6) Educate system administrators about the risks of insecure temporary file handling and encourage regular security audits of local privilege boundaries.
Affected Countries
Germany, United States, China, India, France, United Kingdom, Russia, Brazil, Japan, South Korea
CVE-2026-25701: CWE-377: Insecure Temporary File in openSUSE sdbootutil
Description
An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored. * overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak. This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25701 is an insecure temporary file vulnerability classified under CWE-377 affecting the sdbootutil utility in openSUSE Linux distributions. The flaw allows local users with limited privileges to pre-create directories that sdbootutil uses insecurely during its operations. This can lead to multiple malicious outcomes: unauthorized access to potentially sensitive information stored in /var/lib/pcrlock.d, manipulation of backup data in /tmp/pcrlock.d.bak compromising data integrity, and overwriting of protected system files by exploiting symbolic link (symlink) attacks within the temporary backup directory. The vulnerability stems from insufficient validation and secure handling of temporary files and directories, enabling attackers to influence file system operations. The CVSS 4.0 score of 7.0 (high severity) reflects the vulnerability’s local attack vector, low complexity, no required authentication, and significant impact on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability poses a serious risk to systems running vulnerable versions of sdbootutil, especially in environments where local user access is possible. The affected versions are not explicitly specified but include all versions prior to commit 5880246d3a02642dc68f5c8cb474bf63cdb56bca. The issue was published on February 25, 2026, and is currently unpatched. Organizations relying on openSUSE should monitor for updates and assess local user permissions carefully.
Potential Impact
The vulnerability allows local attackers to compromise confidentiality by accessing private information in /var/lib/pcrlock.d. It also threatens data integrity by enabling manipulation of backup data in /tmp/pcrlock.d.bak, which could lead to corrupted or maliciously altered system states upon restoration. Additionally, the ability to overwrite protected system files via symlink attacks could result in privilege escalation or system instability, impacting availability. The scope is limited to local users but can be critical in multi-user environments or where untrusted users have shell access. Exploitation does not require user interaction or elevated privileges beyond local access, increasing the risk in shared or poorly secured systems. The overall impact includes potential unauthorized data disclosure, system compromise, and disruption of normal system operations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Apply patches or updates from openSUSE as soon as they become available to fix the insecure temporary file handling in sdbootutil. 2) Restrict local user access to systems running vulnerable versions, especially limiting shell or terminal access to trusted users only. 3) Implement strict file system permissions and use mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized creation or manipulation of directories and symlinks in sensitive paths such as /tmp and /var/lib. 4) Monitor system logs for unusual file system activity related to /tmp/pcrlock.d.bak and /var/lib/pcrlock.d to detect potential exploitation attempts. 5) Consider using filesystem namespaces or containerization to isolate processes that use sdbootutil, reducing the risk of local privilege abuse. 6) Educate system administrators about the risks of insecure temporary file handling and encourage regular security audits of local privilege boundaries.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- suse
- Date Reserved
- 2026-02-05T15:37:24.183Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699edc67b7ef31ef0bffee91
Added to database: 2/25/2026, 11:26:31 AM
Last enriched: 3/4/2026, 8:37:30 PM
Last updated: 4/11/2026, 6:39:01 PM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.