Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25701: CWE-377: Insecure Temporary File in openSUSE sdbootutil

0
High
VulnerabilityCVE-2026-25701cvecve-2026-25701cwe-377
Published: Wed Feb 25 2026 (02/25/2026, 10:59:58 UTC)
Source: CVE Database V5
Vendor/Project: openSUSE
Product: sdbootutil

Description

An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored. *  overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak. This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 20:37:30 UTC

Technical Analysis

CVE-2026-25701 is an insecure temporary file vulnerability classified under CWE-377 affecting the sdbootutil utility in openSUSE Linux distributions. The flaw allows local users with limited privileges to pre-create directories that sdbootutil uses insecurely during its operations. This can lead to multiple malicious outcomes: unauthorized access to potentially sensitive information stored in /var/lib/pcrlock.d, manipulation of backup data in /tmp/pcrlock.d.bak compromising data integrity, and overwriting of protected system files by exploiting symbolic link (symlink) attacks within the temporary backup directory. The vulnerability stems from insufficient validation and secure handling of temporary files and directories, enabling attackers to influence file system operations. The CVSS 4.0 score of 7.0 (high severity) reflects the vulnerability’s local attack vector, low complexity, no required authentication, and significant impact on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability poses a serious risk to systems running vulnerable versions of sdbootutil, especially in environments where local user access is possible. The affected versions are not explicitly specified but include all versions prior to commit 5880246d3a02642dc68f5c8cb474bf63cdb56bca. The issue was published on February 25, 2026, and is currently unpatched. Organizations relying on openSUSE should monitor for updates and assess local user permissions carefully.

Potential Impact

The vulnerability allows local attackers to compromise confidentiality by accessing private information in /var/lib/pcrlock.d. It also threatens data integrity by enabling manipulation of backup data in /tmp/pcrlock.d.bak, which could lead to corrupted or maliciously altered system states upon restoration. Additionally, the ability to overwrite protected system files via symlink attacks could result in privilege escalation or system instability, impacting availability. The scope is limited to local users but can be critical in multi-user environments or where untrusted users have shell access. Exploitation does not require user interaction or elevated privileges beyond local access, increasing the risk in shared or poorly secured systems. The overall impact includes potential unauthorized data disclosure, system compromise, and disruption of normal system operations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Apply patches or updates from openSUSE as soon as they become available to fix the insecure temporary file handling in sdbootutil. 2) Restrict local user access to systems running vulnerable versions, especially limiting shell or terminal access to trusted users only. 3) Implement strict file system permissions and use mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized creation or manipulation of directories and symlinks in sensitive paths such as /tmp and /var/lib. 4) Monitor system logs for unusual file system activity related to /tmp/pcrlock.d.bak and /var/lib/pcrlock.d to detect potential exploitation attempts. 5) Consider using filesystem namespaces or containerization to isolate processes that use sdbootutil, reducing the risk of local privilege abuse. 6) Educate system administrators about the risks of insecure temporary file handling and encourage regular security audits of local privilege boundaries.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2026-02-05T15:37:24.183Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699edc67b7ef31ef0bffee91

Added to database: 2/25/2026, 11:26:31 AM

Last enriched: 3/4/2026, 8:37:30 PM

Last updated: 4/11/2026, 6:39:01 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses