MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.
History

Sun, 24 Aug 2025 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Mcsmanager
Mcsmanager mcsmanager
Vendors & Products Mcsmanager
Mcsmanager mcsmanager

Fri, 22 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-266
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Aug 2025 14:00:00 +0000

Type Values Removed Values Added
Description MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-22T00:00:00.000Z

Updated: 2025-08-22T17:42:47.447Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50691

cve-icon Vulnrichment

Updated: 2025-08-22T17:42:40.331Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-22T14:15:46.453

Modified: 2025-08-22T18:15:35.123

Link: CVE-2025-50691

cve-icon Redhat

No data.