CVE-2025-53391

9.3 CRITICAL

📋 TL;DR

This vulnerability in Debian's zuluCrypt package allows local users to escalate privileges to root due to insecure PolicyKit settings. The flaw exists in the zuluPolkit/CMakeLists.txt file, which grants excessive permissions. Any Debian system running the vulnerable zulucrypt package is affected.

💻 Affected Systems

Products:
  • zuluCrypt
Versions: zulucrypt through version 6.2.0-1
Operating Systems: Debian Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Debian systems with the vulnerable zulucrypt package installed. The vulnerability is in the PolicyKit configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full root privileges, compromising the entire system and potentially accessing sensitive data or installing persistent malware.

🟠

Likely Case

Local user with standard privileges exploits the vulnerability to become root, gaining complete control over the system.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained, limiting lateral movement.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any local user on affected systems can potentially gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is likely straightforward given the nature of PolicyKit misconfiguration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in patched versions referenced in Debian bug report

Vendor Advisory: https://bugs.debian.org/1108288

Restart Required: No

Instructions:

1. Update zulucrypt package: sudo apt update && sudo apt upgrade zulucrypt
2. Apply the patch from Debian repository: https://salsa.debian.org/debian/zulucrypt/-/blob/9d661c9f384c4d889d3387944e14ac70cfb9684b/debian/patches/fix_zulupolkit_policy.patch

🔧 Temporary Workarounds

Remove zuluCrypt package

linux

Uninstall the vulnerable package if not needed

sudo apt remove zulucrypt

Restrict PolicyKit permissions

linux

Manually adjust PolicyKit configuration to remove excessive permissions

sudo nano /usr/share/polkit-1/actions/com.github.mhogomchungu.zulucrypt.policy
Remove allow_any, allow_inactive, allow_active settings

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable zuluCrypt installation
  • Implement strict monitoring for privilege escalation attempts and PolicyKit usage

🔍 How to Verify

Check if Vulnerable:

Check installed zulucrypt version: dpkg -l | grep zulucrypt

Check Version:

dpkg -l | grep zulucrypt

Verify Fix Applied:

Verify version is newer than 6.2.0-1 and check PolicyKit configuration for insecure settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual PolicyKit authorization requests
  • Unexpected privilege escalation attempts
  • zuluCrypt processes running with elevated privileges

Network Indicators:

  • N/A - Local vulnerability

SIEM Query:

Search for PolicyKit authorization events related to zuluCrypt or unexpected root privilege acquisition

🔗 References

📤 Share & Export