Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users

Posted on September 1, 2025September 1, 2025 By CWS

A crucial safety vulnerability has been found within the Linux UDisks daemon that would permit unprivileged attackers to realize entry to information owned by privileged customers. 

The flaw, recognized as CVE-2025-8067, was publicly disclosed on August 28, 2025, and carries an Essential severity ranking with a CVSS v3 rating of 8.5.

Key Takeaways1. CVE-2025-8067 within the Linux UDisks daemon permits privilege escalation.2. Impacts Purple Hat Enterprise Linux 6-10, enabling native attackers to entry privileged information simply.3. No workarounds exist.

UDisks D-Bus Privilege Escalation Flaw 

The vulnerability originates from improper enter validation within the UDisks daemon’s loop gadget handler, which processes requests by means of the D-BUS interface. 

The flaw happens when the daemon handles two crucial parameters: the file descriptor listing and an index worth that specifies the backing file for loop gadget creation.

Whereas the daemon appropriately validates the higher sure of the index parameter to stop it from exceeding most allowed values, it fails to validate the decrease sure. 

This oversight permits attackers to provide detrimental index values, resulting in an out-of-bounds learn situation categorised as CWE-125.

The vulnerability allows unprivileged customers to create loop units by means of the D-BUS system interface, probably inflicting the UDisks daemon to crash or, extra critically, facilitating native privilege escalation. 

Attackers can exploit this flaw to entry delicate information owned by privileged customers, bypassing regular permission controls.

Safety researcher Michael Imfeld (born0monday) found and reported this vulnerability to Purple Hat.

Threat FactorsDetailsAffected ProductsRed Hat Enterprise Linux 10 (udisks2)Purple Hat Enterprise Linux 9 (udisks2)Purple Hat Enterprise Linux 8 (udisks2)Purple Hat Enterprise Linux 7 (udisks2)Purple Hat Enterprise Linux 6 (udisks – Out of assist)ImpactLocal privilege escalationExploit PrerequisitesLocal entry to focus on systemAbility to ship D-BUS requestsNo consumer interplay requiredCVSS 3.1 Score8.5 (Essential)

Affected Methods

Purple Hat’s Product Safety workforce has categorised this vulnerability as Essential on account of its low exploitation complexity and vital privilege escalation potential. 

The vulnerability impacts a number of Purple Hat Enterprise Linux variations:

Purple Hat Enterprise Linux 10 (udisks2)

Purple Hat Enterprise Linux 9 (udisks2)

Purple Hat Enterprise Linux 8 (udisks2)

Purple Hat Enterprise Linux 7 (udisks2)

Purple Hat Enterprise Linux 6 (udisks – out of assist scope)

The CVSS v3 vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H signifies an area assault vector with low complexity, requiring no privileges or consumer interplay. 

The vulnerability has a Modified scope with Low confidentiality and integrity impression however Excessive availability impression.

The technical impression consists of potential reminiscence disclosure of cryptographic keys, personally identifiable info, and reminiscence addresses that would bypass Deal with Area Format Randomization (ASLR) protections.

Presently, no mitigation is obtainable aside from putting in up to date packages as soon as they develop into out there. 

Organizations utilizing affected Linux distributions ought to prioritize making use of safety patches instantly upon launch to stop potential exploitation of this privilege escalation vulnerability.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Access, Attackers, daemon, Files, Gaining, Linux, Owned, Privileged, Udisks, Users, Vulnerability

Post navigation

Previous Post: CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
Next Post: ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

Related Posts

Cisco Nexus 3000 and 9000 Series Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens Cyber Security News
Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages Cyber Security News
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform
  • How to Use Biometrics Securely
  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
  • CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
  • US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform
  • How to Use Biometrics Securely
  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
  • CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
  • US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News