CVE-2025-2759

7.8 HIGH

📋 TL;DR

This CVE-2025-2759 vulnerability in GStreamer's installer allows local attackers to escalate privileges by exploiting incorrect folder permissions. Attackers need initial low-privileged access to execute code that can then gain higher privileges. Systems with vulnerable GStreamer installations are affected.

💻 Affected Systems

Products:
  • GStreamer
Versions: Specific vulnerable versions not specified in advisory, but likely affects multiple recent versions prior to patch
Operating Systems: Windows, Linux, macOS - all platforms where GStreamer is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installer component, so affects fresh installations and potentially upgrades.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full system control, installs persistent malware, accesses sensitive data, and compromises the entire system.

🟠

Likely Case

Local user or malware with initial access escalates to administrator/root privileges to install additional payloads or maintain persistence.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts are detected and contained before privilege escalation completes.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access and ability to execute code. The permission misconfiguration makes exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GStreamer security advisory for specific patched version

Vendor Advisory: https://gstreamer.freedesktop.org/security/

Restart Required: No

Instructions:

1. Check current GStreamer version. 2. Visit GStreamer security advisory page. 3. Download and install the latest patched version. 4. Verify installation permissions are correct.

🔧 Temporary Workarounds

Manual Permission Correction

linux

Manually set correct permissions on GStreamer installation folders to prevent privilege escalation

chmod 755 /usr/lib/gstreamer-1.0
chmod 755 /usr/local/lib/gstreamer-1.0
chown root:root /usr/lib/gstreamer-1.0

Restrict Local User Privileges

all

Implement least privilege access controls to limit initial attack surface

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges and prevent code execution
  • Monitor for suspicious privilege escalation attempts and file permission changes

🔍 How to Verify

Check if Vulnerable:

Check GStreamer version and review folder permissions in installation directory for insecure settings

Check Version:

gst-launch-1.0 --version

Verify Fix Applied:

Verify GStreamer is updated to patched version and installation folders have correct permissions (not world-writable)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected permission changes to GStreamer directories
  • Processes spawning with elevated privileges from GStreamer paths
  • Failed privilege escalation attempts

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

Process creation where parent process is in GStreamer directory AND privilege level changes

🔗 References

📤 Share & Export