A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
History
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. | |
| Title | Privilege escalation possible | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2026-03-09T08:17:11.116Z
Updated: 2026-03-09T20:14:04.600Z
Reserved: 2025-04-16T11:18:45.760Z
Link: CVE-2025-41761
Updated: 2026-03-09T20:04:15.345Z
Status : Awaiting Analysis
Published: 2026-03-09T09:16:00.263
Modified: 2026-03-09T13:35:07.393
Link: CVE-2025-41761
No data.