CVE-2025-57849

Plain English Summary

AI-powered analysis for quick understanding

An attacker can gain full root privileges within a vulnerable container by modifying the /etc/passwd file, allowing them to create a new user with root access. This can happen if they can run commands inside the container and are part of the root group, which is made possible by the way the container's files were set up during its creation.

Technical Description

A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$914($500-$1K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Mar 13, 2026

25 days ago

Last Modified

Mar 16, 2026

22 days ago