Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service

Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service

Posted on January 12, 2026January 12, 2026 By CWS

Essential vulnerabilities in InputPlumber, a Linux enter machine utility utilized in SteamOS, might enable attackers to inject UI inputs and trigger denial-of-service situations on affected programs.

The SUSE researchers tracked as CVE-2025-66005 and CVE-2025-14338, which have an effect on InputPlumber variations earlier than v0.69.0 and stem from insufficient D-Bus authorization mechanisms.

InputPlumber combines Linux enter gadgets into digital enter gadgets and runs with full root privileges, making these flaws notably harmful.

The vulnerabilities enable any consumer on the system, together with low-privilege accounts, to entry InputPlumber’s D-Bus service with out authentication.

CVE IDIssueAffected VersionsImpactCVE-2025-66005Missing authorization in D-Bus interface< v0.63.0DoS, data leak, privilege escalationCVE-2025-14338Polkit auth disabled + auth race situation< v0.69.0DoS, data leak, privilege escalation

Attackers Exploit this Entry in A number of Methods

UI Enter Injection: Malicious actors can create digital keyboard gadgets and inject keystrokes into energetic consumer periods.

This might result in arbitrary code execution within the context of the at present logged-in consumer, compromising their session and knowledge.

Denial-of-Service: The CreateCompositeDevice technique accepts file paths from shoppers, permitting attackers to set off reminiscence exhaustion by passing particular information corresponding to /dev/zero.

Data Disclosure: The identical technique can carry out file existence checks and leak delicate data from information usually inaccessible to low-privilege customers, corresponding to /root/.bash_history.

The vulnerabilities primarily have an effect on Linux gaming programs working InputPlumber, together with SteamOS. Valve has launched SteamOS 3.7.20, which incorporates the InputPlumber v0.69.0 repair.

Upstream builders have addressed most points by switching to correct Polkit authentication, enabling authorization by default, and making use of systemd hardening.

Nevertheless, some D-Bus API enhancements that use file descriptors as a substitute of pathnames stay unmerged.

SUSE researchers advise system directors to right away replace to InputPlumber v0.69.0 or later, particularly on gaming programs and SteamOS installations.

The coordinated disclosure course of between SUSE safety researchers and InputPlumber builders ensured fixes had been out there earlier than public disclosure.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Critical, DenialofService, Injection, Input, InputPlumber, Vulnerabilities

Post navigation

Previous Post: Everest Hacking Group Allegedly Claims Breach of Nissan Motors
Next Post: Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Related Posts

Attackers Redirected Employee Paychecks Without Breaching a Single System Attackers Redirected Employee Paychecks Without Breaching a Single System Cyber Security News
Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? Cyber Security News
Top 10 Best Endpoint Security Tools Top 10 Best Endpoint Security Tools Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark