CVE-2025-46802

6.0 MEDIUM

📋 TL;DR

This vulnerability in screen allows any local user to connect to another user's screen session during a brief window when the PTY device has overly permissive permissions (mode 666). This affects systems where screen is installed and multiple users have shell access.

💻 Affected Systems

Products:
  • screen terminal multiplexer
Versions: Specific versions not detailed in references, but appears to affect recent versions prior to fix
Operating Systems: Linux/Unix systems with screen installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with multiple local users and screen sessions running.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could hijack active screen sessions to execute commands as other users, potentially escalating privileges or accessing sensitive data.

🟠

Likely Case

Local users can spy on or interfere with other users' screen sessions, leading to information disclosure or session disruption.

🟢

If Mitigated

With proper user separation and monitoring, impact is limited to potential session snooping between non-privileged users.

🌐 Internet-Facing: LOW - This requires local system access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Multi-user systems with screen installed are vulnerable to local privilege abuse.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple timing attack to access PTY during vulnerable window

Exploitation requires local access and timing to catch the brief 666 permission window.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisories for specific patched versions

Vendor Advisory: https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-46802

Restart Required: No

Instructions:

1. Check your distribution's security advisories. 2. Update screen package via package manager. 3. No restart needed, but existing screen sessions should be restarted.

🔧 Temporary Workarounds

Restrict screen usage

linux

Limit screen usage to trusted users or disable where not needed

chmod 750 /usr/bin/screen
setfacl -m u:trusteduser:rx /usr/bin/screen

Monitor PTY permissions

linux

Use monitoring tools to detect PTY devices with 666 permissions

find /dev/pts -perm 666 -ls

🧯 If You Can't Patch

  • Implement strict user separation and monitor for unauthorized screen session access
  • Use alternative terminal multiplexers like tmux that don't have this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check screen version and test if PTY devices briefly appear with 666 permissions during session creation

Check Version:

screen --version

Verify Fix Applied:

Verify screen package version is updated and test that PTY permissions remain restricted during session creation

📡 Detection & Monitoring

Log Indicators:

  • Multiple users accessing same PTY device
  • Failed screen session connections from unexpected users

Network Indicators:

  • Not applicable - local vulnerability only

SIEM Query:

search 'screen' AND 'permission denied' OR 'PTY' AND user!=expected_user

🔗 References

📤 Share & Export