Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25701: CWE-377: Insecure Temporary File in openSUSE sdbootutil

0
High
VulnerabilityCVE-2026-25701cvecve-2026-25701cwe-377
Published: Wed Feb 25 2026 (02/25/2026, 10:59:58 UTC)
Source: CVE Database V5
Vendor/Project: openSUSE
Product: sdbootutil

Description

CVE-2026-25701 is a high-severity vulnerability in the openSUSE sdbootutil utility involving insecure handling of temporary files. Local attackers can pre-create directories to access sensitive information in /var/lib/pcrlock. d, manipulate backup data in /tmp/pcrlock. d. bak, and potentially overwrite protected system files via symlink attacks. Exploitation requires local access and low privileges but no user interaction or authentication. The vulnerability impacts data confidentiality and integrity, with a CVSS score of 7. There are no known exploits in the wild yet. Organizations using openSUSE with sdbootutil should prioritize patching once available and implement strict directory and file permission controls. Countries with significant openSUSE usage and critical infrastructure relying on Linux systems are most at risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 11:40:48 UTC

Technical Analysis

CVE-2026-25701 is an insecure temporary file vulnerability classified under CWE-377 affecting the openSUSE sdbootutil utility. This flaw allows local users to pre-create directories that the utility uses insecurely, enabling several attack vectors. Specifically, attackers can gain unauthorized access to potentially sensitive information stored in /var/lib/pcrlock.d by exploiting predictable or improperly secured temporary directories. Additionally, they can manipulate the integrity of backup data located in /tmp/pcrlock.d.bak by injecting malicious data or symlinks, which can lead to overwriting protected system files when the backup is restored. The vulnerability arises from improper handling of temporary files and directories without adequate validation or secure creation methods, such as using safe APIs or randomized temporary paths. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no authentication required (AT:N), low privileges needed (PR:L), no user interaction (UI:N), and impacts on confidentiality (VC:L), integrity (VI:H), and availability (VA:H). The vulnerability affects versions of sdbootutil prior to commit 5880246d3a02642dc68f5c8cb474bf63cdb56bca, though exact version numbers are unspecified. No public exploits are currently known, but the potential for privilege escalation and system compromise is significant.

Potential Impact

The impact of CVE-2026-25701 is substantial for organizations running openSUSE systems with the vulnerable sdbootutil version. Attackers with local access can compromise confidentiality by accessing private information stored in system directories. They can also violate data integrity by manipulating backup files, potentially causing system instability or unauthorized changes upon restoration. The ability to overwrite protected system files via symlink attacks can lead to privilege escalation, persistent backdoors, or denial of service by corrupting critical system components. This vulnerability threatens the security posture of servers, workstations, and embedded devices using openSUSE, especially in environments where multiple users have local access or where attackers can gain footholds through other means. The lack of required user interaction and low complexity of exploitation increase the risk of successful attacks. Although no known exploits exist yet, the vulnerability's characteristics suggest it could be leveraged in targeted attacks against Linux-based infrastructure, impacting confidentiality, integrity, and availability.

Mitigation Recommendations

To mitigate CVE-2026-25701, organizations should first monitor openSUSE security advisories and apply patches or updates to sdbootutil as soon as they become available. In the absence of patches, administrators should enforce strict file system permissions on /var/lib/pcrlock.d and /tmp/pcrlock.d.bak to prevent unauthorized directory creation or symlink manipulation by unprivileged users. Implementing mandatory access controls (e.g., SELinux or AppArmor) can restrict sdbootutil's ability to follow symlinks or write to sensitive directories. Regularly auditing temporary directories for unexpected files or symlinks can help detect exploitation attempts. Limiting local user access to trusted personnel and employing user session isolation techniques reduce the attack surface. Additionally, system administrators should consider using secure temporary file creation methods and environment hardening to prevent exploitation of insecure temporary file handling. Finally, integrating file integrity monitoring solutions can alert on unauthorized changes to critical system files.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2026-02-05T15:37:24.183Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699edc67b7ef31ef0bffee91

Added to database: 2/25/2026, 11:26:31 AM

Last enriched: 2/25/2026, 11:40:48 AM

Last updated: 2/25/2026, 1:38:06 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats