Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users

Posted on September 1, 2025September 1, 2025 By CWS

A crucial safety vulnerability has been found within the Linux UDisks daemon that would permit unprivileged attackers to realize entry to information owned by privileged customers. 

The flaw, recognized as CVE-2025-8067, was publicly disclosed on August 28, 2025, and carries an Essential severity ranking with a CVSS v3 rating of 8.5.

Key Takeaways1. CVE-2025-8067 within the Linux UDisks daemon permits privilege escalation.2. Impacts Purple Hat Enterprise Linux 6-10, enabling native attackers to entry privileged information simply.3. No workarounds exist.

UDisks D-Bus Privilege Escalation Flaw 

The vulnerability originates from improper enter validation within the UDisks daemon’s loop gadget handler, which processes requests by means of the D-BUS interface. 

The flaw happens when the daemon handles two crucial parameters: the file descriptor listing and an index worth that specifies the backing file for loop gadget creation.

Whereas the daemon appropriately validates the higher sure of the index parameter to stop it from exceeding most allowed values, it fails to validate the decrease sure. 

This oversight permits attackers to provide detrimental index values, resulting in an out-of-bounds learn situation categorised as CWE-125.

The vulnerability allows unprivileged customers to create loop units by means of the D-BUS system interface, probably inflicting the UDisks daemon to crash or, extra critically, facilitating native privilege escalation. 

Attackers can exploit this flaw to entry delicate information owned by privileged customers, bypassing regular permission controls.

Safety researcher Michael Imfeld (born0monday) found and reported this vulnerability to Purple Hat.

Threat FactorsDetailsAffected ProductsRed Hat Enterprise Linux 10 (udisks2)Purple Hat Enterprise Linux 9 (udisks2)Purple Hat Enterprise Linux 8 (udisks2)Purple Hat Enterprise Linux 7 (udisks2)Purple Hat Enterprise Linux 6 (udisks – Out of assist)ImpactLocal privilege escalationExploit PrerequisitesLocal entry to focus on systemAbility to ship D-BUS requestsNo consumer interplay requiredCVSS 3.1 Score8.5 (Essential)

Affected Methods

Purple Hat’s Product Safety workforce has categorised this vulnerability as Essential on account of its low exploitation complexity and vital privilege escalation potential. 

The vulnerability impacts a number of Purple Hat Enterprise Linux variations:

Purple Hat Enterprise Linux 10 (udisks2)

Purple Hat Enterprise Linux 9 (udisks2)

Purple Hat Enterprise Linux 8 (udisks2)

Purple Hat Enterprise Linux 7 (udisks2)

Purple Hat Enterprise Linux 6 (udisks – out of assist scope)

The CVSS v3 vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H signifies an area assault vector with low complexity, requiring no privileges or consumer interplay. 

The vulnerability has a Modified scope with Low confidentiality and integrity impression however Excessive availability impression.

The technical impression consists of potential reminiscence disclosure of cryptographic keys, personally identifiable info, and reminiscence addresses that would bypass Deal with Area Format Randomization (ASLR) protections.

Presently, no mitigation is obtainable aside from putting in up to date packages as soon as they develop into out there. 

Organizations utilizing affected Linux distributions ought to prioritize making use of safety patches instantly upon launch to stop potential exploitation of this privilege escalation vulnerability.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Access, Attackers, daemon, Files, Gaining, Linux, Owned, Privileged, Udisks, Users, Vulnerability

Post navigation

Previous Post: CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
Next Post: ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

Related Posts

New Phising Attack Targeting Travellers from Hotel’s Compromised Booking.com Account Cyber Security News
MuddyWater APT Weaponizing Word Documents to Deliver ‘RustyWater’ Toolkit Evading AV and EDR Tools Cyber Security News
50 World’s Best Cyber Security Companies in 2025 (March) Cyber Security News
Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates Cyber Security News
143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025 Cyber Security News
New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark