Container Privilege Escalation Flaw in KServe ModelMesh by Red Hat
CVE-2025-57852
5.2MEDIUM
What is CVE-2025-57852?
A potential security flaw has been identified in the KServe ModelMesh container images, allowing for privilege escalation due to improperly set permissions on the /etc/passwd file. During the container's build process, this file can be left with group-writable permissions. This allows an attacker, who gains access to the container environment—even as a non-root user—to exploit their membership in the root group. If successful, the attacker can modify the /etc/passwd file to create a new user with arbitrary User IDs, including the highly privileged UID 0, potentially providing them with full root access within the container environment.
References
CVSS V3.1
Score:
5.2
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.