Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25702: CWE-284: Improper Access Control in SUSE SUSE Linux Enterprise Server

0
High
VulnerabilityCVE-2026-25702cvecve-2026-25702cwe-284
Published: Thu Mar 05 2026 (03/05/2026, 07:00:18 UTC)
Source: CVE Database V5
Vendor/Project: SUSE
Product: SUSE Linux Enterprise Server

Description

A Improper Access Control vulnerability in the kernel of SUSE SUSE Linux Enterprise Server 12 SP5 breaks nftables, causing firewall rules applied via nftables to not be effective.This issue affects SUSE Linux Enterprise Server: from 9e6d9d4601768c75fdb0bad3fbbe636e748939c2 before 9c294edb7085fb91650bc12233495a8974c5ff2d.

AI-Powered Analysis

AILast updated: 03/05/2026, 07:32:56 UTC

Technical Analysis

CVE-2026-25702 is an improper access control vulnerability categorized under CWE-284, found in the kernel of SUSE Linux Enterprise Server (SLES) 12 SP5. The vulnerability specifically affects the nftables subsystem, which is responsible for firewall rule enforcement in modern Linux kernels. Due to this flaw, firewall rules applied via nftables do not function correctly, effectively rendering firewall protections ineffective. This can allow unauthorized network traffic to bypass firewall restrictions, exposing systems to potential attacks such as unauthorized access, data exfiltration, or lateral movement within networks. The vulnerability affects SLES versions prior to the commit identified as 9c294edb7085fb91650bc12233495a8974c5ff2d. The CVSS 3.1 base score is 7.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits have been reported in the wild yet, but the nature of the vulnerability makes it a significant risk for organizations relying on nftables for firewall enforcement. The issue was reserved in early February 2026 and published in March 2026, indicating recent discovery and disclosure. The lack of patch links suggests that fixes may still be forthcoming or in development. This vulnerability undermines a fundamental security control, making it critical for affected organizations to monitor for updates and apply patches promptly.

Potential Impact

The primary impact of CVE-2026-25702 is the failure of firewall rules enforced via nftables on affected SUSE Linux Enterprise Server systems. This failure compromises network security by allowing unauthorized or malicious traffic to pass through what should be a controlled boundary. As a result, attackers could gain unauthorized access to internal systems, exfiltrate sensitive data, or disrupt services by bypassing firewall protections. The compromise of confidentiality, integrity, and availability can lead to data breaches, service outages, and increased risk of lateral movement within enterprise networks. Organizations that rely heavily on SLES for critical infrastructure or that use nftables as a primary firewall mechanism are particularly vulnerable. The ease of exploitation (no privileges or user interaction required) increases the risk of automated or remote attacks. Although no exploits are currently known in the wild, the high severity and fundamental nature of the vulnerability mean that attackers may develop exploits rapidly once patches are released. This could lead to widespread exploitation, especially in environments with delayed patching or inadequate network segmentation.

Mitigation Recommendations

1. Monitor SUSE’s official security advisories closely for the release of patches addressing CVE-2026-25702 and apply them immediately upon availability. 2. Until patches are applied, implement compensating controls such as deploying external firewall appliances or network intrusion prevention systems (IPS) to enforce network traffic filtering outside the affected hosts. 3. Restrict network access to critical systems running affected versions of SLES by using network segmentation and strict access control lists (ACLs) at the perimeter and internal network layers. 4. Employ host-based intrusion detection systems (HIDS) to monitor for anomalous network traffic patterns that may indicate firewall bypass attempts. 5. Review and harden nftables configurations to minimize exposure, including disabling unnecessary services and ports. 6. Consider temporary use of alternative firewall tools or kernel modules if feasible and supported. 7. Maintain robust logging and monitoring to detect suspicious activity early. 8. Educate system administrators about the vulnerability and the importance of timely patching and network defense in depth strategies. These steps go beyond generic advice by emphasizing layered network controls and proactive monitoring to mitigate risk until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
suse
Date Reserved
2026-02-05T15:37:24.183Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a92e3cd1a09e29cbef609b

Added to database: 3/5/2026, 7:18:20 AM

Last enriched: 3/5/2026, 7:32:56 AM

Last updated: 3/5/2026, 9:14:20 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses