CVE-2025-57849
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain full root privileges within a vulnerable container by modifying the /etc/passwd file, allowing them to create a new user with root access. This can happen if they can run commands inside the container and are part of the root group, which is made possible by the way the container's files were set up during its creation.
Technical Description
A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 13, 2026
25 days ago
Last Modified
Mar 16, 2026
22 days ago