CVE-2025-8766

| EUVD-2025-208625 MEDIUM
2026-03-13 redhat
6.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 13, 2026 - 07:58 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 07:58 euvd
EUVD-2025-208625
CVE Published
Mar 13, 2026 - 02:48 nvd
MEDIUM 6.4

Description

A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container

Analysis

Medium severity vulnerability in systemd. A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd f...

Technical Context

Vulnerability Type: Incorrect Default Permissions (CWE-276)

CVSS 3.1: 6.4/10.0 — Attack Vector: Local | Complexity: High | Privileges Required: High | User Interaction: None

Attack Techniques: Privilege Escalation

Source: redhat

Affected Products

Product: systemd

Remediation

Monitor redhat for patches and updates. Reference: https://access.redhat.com/security/cve/CVE-2025-8766

Priority Score

32
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0

Vendor Status

Share

CVE-2025-8766 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy