CVE-2025-54288

| EUVD-2025-32637 MEDIUM
6.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

5
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 13, 2026 - 19:12 euvd
EUVD-2025-32637
Analysis Generated
Mar 13, 2026 - 19:12 vuln.today
PoC Detected
Oct 24, 2025 - 14:44 vuln.today
Public exploit code
CVE Published
Oct 02, 2025 - 10:15 nvd
MEDIUM 6.8

Description

Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.

Analysis

Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.

Technical Context

An authentication bypass vulnerability allows attackers to circumvent login mechanisms and gain unauthorized access without valid credentials. This vulnerability is classified as Authentication Bypass by Spoofing (CWE-290).

Affected Products

Affected products: Canonical Lxd

Remediation

Implement robust authentication mechanisms. Use multi-factor authentication. Review authentication logic for bypass conditions. Remove default credentials.

Priority Score

54
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +34
POC: +20

Vendor Status

Ubuntu

Priority: Medium
lxd
Release Status Version
plucky DNE -
upstream needs-triage -
xenial needs-triage -
bionic needs-triage -
focal needs-triage -
jammy DNE -
noble DNE -
questing DNE -

Debian

incus
Release Status Fixed Version Urgency
trixie fixed 6.0.4-2+deb13u1 -
trixie (security) fixed 6.0.4-2+deb13u4 -
forky, sid fixed 6.0.5-8 -
(unstable) fixed 6.0.5-1 -
lxd
Release Status Fixed Version Urgency
bookworm fixed 5.0.2-5+deb12u1 -
bookworm (security) fixed 5.0.2-5+deb12u3 -
trixie fixed 5.0.2+git20231211.1364ae4-9+deb13u1 -
trixie (security) fixed 5.0.2+git20231211.1364ae4-9+deb13u3 -
(unstable) fixed (unfixed) -

Share

CVE-2025-54288 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy