CVE-2025-5962

7.7 HIGH

📋 TL;DR

A local privilege escalation vulnerability in Lightspeed history service allows unprivileged users on the same system to access and manipulate other users' chat history. Attackers can view, delete, or inject malicious history entries to deceive users into executing harmful commands. This affects systems running vulnerable versions of Lightspeed with local user accounts.

💻 Affected Systems

Products:
  • Lightspeed history service
Versions: Specific versions not detailed in CVE; check Red Hat advisories for affected releases
Operating Systems: Linux (Red Hat Enterprise Linux based on advisories)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where Lightspeed history service is enabled and multiple local users exist. Red Hat advisories indicate specific RHEL versions are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could inject malicious commands into another user's history, leading to privilege escalation, data theft, or complete system compromise through social engineering.

🟠

Likely Case

Local users accessing and manipulating each other's chat history, potentially leading to confusion, data loss, or execution of unintended commands.

🟢

If Mitigated

Limited to isolated systems with strict user separation or where the service is disabled.

🌐 Internet-Facing: LOW - This requires local system access, not directly exploitable over the network.
🏢 Internal Only: HIGH - Any system with multiple local users running the vulnerable service is at risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation involves abusing inter-process communication calls, which is straightforward for local attackers.

Exploitation requires local access and knowledge of inter-process communication mechanisms. No public exploit code mentioned in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Red Hat advisories RHSA-2025:16345 and RHSA-2025:16346 for specific patched versions

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2025-5962

Restart Required: Yes

Instructions:

1. Update system using package manager (e.g., 'yum update' for RHEL). 2. Apply patches from Red Hat advisories. 3. Restart the Lightspeed history service or reboot system.

🔧 Temporary Workarounds

Disable Lightspeed history service

linux

Temporarily disable the vulnerable service to prevent exploitation.

systemctl stop lightspeed-history
systemctl disable lightspeed-history

Restrict service permissions

linux

Configure stricter access controls on the service to limit user interactions.

chmod 750 /path/to/lightspeed-history-service
setfacl -m u:serviceuser:rwx /path/to/service

🧯 If You Can't Patch

  • Isolate systems to prevent multiple local users from accessing the same instance.
  • Implement strict user separation and monitor for unusual inter-process communication activity.

🔍 How to Verify

Check if Vulnerable:

Check if Lightspeed history service is running and review version against Red Hat advisories: 'systemctl status lightspeed-history' and 'rpm -q lightspeed-history'.

Check Version:

rpm -q lightspeed-history

Verify Fix Applied:

Verify service version after update: 'rpm -q lightspeed-history' matches patched version from advisories, and test local user access attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual inter-process communication attempts to Lightspeed history service
  • Failed access attempts from unauthorized users
  • Unexpected modifications to chat history files

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

source="lightspeed-history" AND (event="access_denied" OR event="unauthorized_ipc")

🔗 References

📤 Share & Export