A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
History
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. | |
| Title | Privilege escalation possible | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-09T08:17:11.116Z
Reserved: 2025-04-16T11:18:45.760Z
Link: CVE-2025-41761
No data.
Status : Received
Published: 2026-03-09T09:16:00.263
Modified: 2026-03-09T09:16:00.263
Link: CVE-2025-41761
No data.
OpenCVE Enrichment
No data.