Container Privilege Escalation Flaw in Multicluster Engine for Kubernetes by Red Hat
CVE-2025-57851
6.4MEDIUM
What is CVE-2025-57851?
A container privilege escalation vulnerability exists in specific images of the Multicluster Engine for Kubernetes. The issue arises from the /etc/passwd file being created with group-writable permissions during the build process. If an attacker gains command execution capabilities within an affected container, even as a non-root user, they can exploit their affiliation with the root group to alter the /etc/passwd file. This manipulation can permit the attacker to introduce a new user with any arbitrary UID, including UID 0, thereby granting them full root access to the container.
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.