CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-3931: Yggdrasil: local privilege escalation in yggdrasil

7.8 CVSS

Description

A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages.

This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.

Classification

CVE ID: CVE-2025-3931

CVSS Base Severity: HIGH

CVSS Base Score: 7.8

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem Types

Improper Handling of Insufficient Permissions or Privileges

Affected Products

Vendor: Red Hat

Product: Red Hat Enterprise Linux 10, Red Hat Satellite 6

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 3.67% (scored less or equal to compared to others)

EPSS Date: 2025-06-12 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3931
https://access.redhat.com/errata/RHSA-2025:7592
https://access.redhat.com/security/cve/CVE-2025-3931
https://bugzilla.redhat.com/show_bug.cgi?id=2362345

Timeline