A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
History
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. | |
| Title | Privilege escalation possible | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-09T08:17:11.116Z
Reserved: 2025-04-16T11:18:45.760Z
Link: CVE-2025-41761
No data.
Status : Received
Published: 2026-03-09T09:16:00.263
Modified: 2026-03-09T09:16:00.263
Link: CVE-2025-41761
No data.
OpenCVE Enrichment
No data.
Weaknesses