CVE-2022-25643

9.8 CRITICAL

📋 TL;DR

CVE-2022-25643 is a privilege escalation vulnerability in seatd-launch (part of seatd 0.6.x) that allows local users to delete arbitrary files with root privileges when the software is installed setuid root. The vulnerability occurs through user-controlled socket pathnames. This affects systems with seatd 0.6.x installed with setuid permissions.

💻 Affected Systems

Products:
  • seatd
  • seatd-launch
Versions: 0.6.x before 0.6.4
Operating Systems: Linux systems with seatd installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when seatd-launch is installed with setuid root permissions. Systems without setuid installation are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary file deletion, potentially leading to denial of service, privilege escalation, or system instability by deleting critical system files.

🟠

Likely Case

Local privilege escalation allowing unprivileged users to delete files they shouldn't have access to, potentially disrupting system operations or other users' data.

🟢

If Mitigated

Limited impact if seatd is not installed setuid root or if proper file permissions prevent exploitation.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any local user on affected systems can potentially exploit this vulnerability to escalate privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access. The vulnerability is straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.6.4

Vendor Advisory: https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CETEO7R.QG8B1KGD531R1%40kl.wtf%3E

Restart Required: No

Instructions:

1. Update seatd to version 0.6.4 or later. 2. Use package manager: 'sudo apt update && sudo apt upgrade seatd' (Debian/Ubuntu) or equivalent for your distribution. 3. For source installations: Download 0.6.4 from GitHub, compile, and install.

🔧 Temporary Workarounds

Remove setuid permissions

linux

Remove setuid root permissions from seatd-launch binary to prevent privilege escalation

sudo chmod u-s /usr/bin/seatd-launch

Uninstall seatd

linux

Remove seatd package if not needed

sudo apt remove seatd
sudo yum remove seatd

🧯 If You Can't Patch

  • Remove setuid permissions from seatd-launch binary
  • Implement strict access controls to limit local user access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check seatd version: 'seatd --version' or 'dpkg -l | grep seatd' or 'rpm -qa | grep seatd'. If version is 0.6.0-0.6.3 and seatd-launch has setuid bit, system is vulnerable.

Check Version:

seatd --version 2>/dev/null || dpkg -l seatd 2>/dev/null || rpm -q seatd 2>/dev/null

Verify Fix Applied:

Verify seatd version is 0.6.4 or later: 'seatd --version'. Check seatd-launch permissions: 'ls -la /usr/bin/seatd-launch' should not show 's' in permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • Failed attempts to access privileged files by unprivileged users

Network Indicators:

  • No network indicators - local vulnerability only

SIEM Query:

Process execution of seatd-launch with unusual arguments or by unexpected users

🔗 References

📤 Share & Export