CVE-2025-3931
Yggdrasil: local privilege escalation in yggdrasil
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.
Se encontró una falla en Yggdrasil, que actúa como intermediario del sistema, permitiendo que los procesos se comuniquen con los procesos "worker" de otros subordinados a través del componente DBus. Yggdrasil crea un método DBus para enviar mensajes a los trabajadores. Sin embargo, omite las comprobaciones de autenticación y autorización, lo que permite que cualquier usuario del sistema lo invoque. Un trabajador de Yggdrasil disponible actúa como gestor de paquetes, con la capacidad de crear y habilitar nuevos repositorios e instalar o eliminar paquetes. Esta falla permite a un atacante con acceso al sistema aprovechar la falta de autenticación en el mensaje de envío para forzar al trabajador de Yggdrasil a instalar paquetes RPM arbitrarios. Este problema provoca una escalada de privilegios local, lo que permite al atacante acceder y modificar datos confidenciales del sistema.
An update for yggdrasil is now available for Red Hat Enterprise Linux 10. Issues addressed include a privilege escalation vulnerability.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-04-25 CVE Reserved
- 2025-05-14 CVE Published
- 2025-05-14 CVE Updated
- 2025-05-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-280: Improper Handling of Insufficient Permissions or Privileges
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2025:7592 | 2025-05-14 | |
https://access.redhat.com/security/cve/CVE-2025-3931 | 2025-05-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2362345 | 2025-05-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Red Hat Search vendor "Red Hat" | Enterprise Linux Search vendor "Red Hat" for product "Enterprise Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Satellite Search vendor "Redhat" for product "Satellite" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Satellite Search vendor "Redhat" for product "Satellite" | * | - |
Affected
|