Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users

Posted on September 1, 2025September 1, 2025 By CWS

A crucial safety vulnerability has been found within the Linux UDisks daemon that would permit unprivileged attackers to realize entry to information owned by privileged customers. 

The flaw, recognized as CVE-2025-8067, was publicly disclosed on August 28, 2025, and carries an Essential severity ranking with a CVSS v3 rating of 8.5.

Key Takeaways1. CVE-2025-8067 within the Linux UDisks daemon permits privilege escalation.2. Impacts Purple Hat Enterprise Linux 6-10, enabling native attackers to entry privileged information simply.3. No workarounds exist.

UDisks D-Bus Privilege Escalation Flaw 

The vulnerability originates from improper enter validation within the UDisks daemon’s loop gadget handler, which processes requests by means of the D-BUS interface. 

The flaw happens when the daemon handles two crucial parameters: the file descriptor listing and an index worth that specifies the backing file for loop gadget creation.

Whereas the daemon appropriately validates the higher sure of the index parameter to stop it from exceeding most allowed values, it fails to validate the decrease sure. 

This oversight permits attackers to provide detrimental index values, resulting in an out-of-bounds learn situation categorised as CWE-125.

The vulnerability allows unprivileged customers to create loop units by means of the D-BUS system interface, probably inflicting the UDisks daemon to crash or, extra critically, facilitating native privilege escalation. 

Attackers can exploit this flaw to entry delicate information owned by privileged customers, bypassing regular permission controls.

Safety researcher Michael Imfeld (born0monday) found and reported this vulnerability to Purple Hat.

Threat FactorsDetailsAffected ProductsRed Hat Enterprise Linux 10 (udisks2)Purple Hat Enterprise Linux 9 (udisks2)Purple Hat Enterprise Linux 8 (udisks2)Purple Hat Enterprise Linux 7 (udisks2)Purple Hat Enterprise Linux 6 (udisks – Out of assist)ImpactLocal privilege escalationExploit PrerequisitesLocal entry to focus on systemAbility to ship D-BUS requestsNo consumer interplay requiredCVSS 3.1 Score8.5 (Essential)

Affected Methods

Purple Hat’s Product Safety workforce has categorised this vulnerability as Essential on account of its low exploitation complexity and vital privilege escalation potential. 

The vulnerability impacts a number of Purple Hat Enterprise Linux variations:

Purple Hat Enterprise Linux 10 (udisks2)

Purple Hat Enterprise Linux 9 (udisks2)

Purple Hat Enterprise Linux 8 (udisks2)

Purple Hat Enterprise Linux 7 (udisks2)

Purple Hat Enterprise Linux 6 (udisks – out of assist scope)

The CVSS v3 vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H signifies an area assault vector with low complexity, requiring no privileges or consumer interplay. 

The vulnerability has a Modified scope with Low confidentiality and integrity impression however Excessive availability impression.

The technical impression consists of potential reminiscence disclosure of cryptographic keys, personally identifiable info, and reminiscence addresses that would bypass Deal with Area Format Randomization (ASLR) protections.

Presently, no mitigation is obtainable aside from putting in up to date packages as soon as they develop into out there. 

Organizations utilizing affected Linux distributions ought to prioritize making use of safety patches instantly upon launch to stop potential exploitation of this privilege escalation vulnerability.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Access, Attackers, daemon, Files, Gaining, Linux, Owned, Privileged, Udisks, Users, Vulnerability

Post navigation

Previous Post: CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
Next Post: ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

Related Posts

Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution Cyber Security News
Actionable Threat Intelligence for Mitigating Emerging Cyber Threats Cyber Security News
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed Cyber Security News
Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery Cyber Security News
AI Coding Assistant Creating a Perfect Blueprints for Attackers Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER
  • Dataminr to Acquire ThreatConnect for $290 Million
  • 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
  • Securing AI to Benefit from AI
  • Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER
  • Dataminr to Acquire ThreatConnect for $290 Million
  • 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store
  • Securing AI to Benefit from AI
  • Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News