CVE-2025-66004

5.7 MEDIUM

📋 TL;DR

A path traversal vulnerability in usbmuxd allows local users to escalate privileges to the service user account. This affects systems running vulnerable versions of usbmuxd, primarily Linux distributions that include this USB multiplexing daemon. Attackers must have local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • usbmuxd
Versions: All versions before commit 3ded00c9985a5108cfc7591a309f9a23d57a8cba
Operating Systems: Linux distributions including Debian, SUSE, and others that package usbmuxd
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local user access to the system. usbmuxd is commonly used for iOS device communication on Linux systems.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to the usbmuxd service user, potentially allowing further system compromise if the service user has elevated permissions.

🟠

Likely Case

Local user gains usbmuxd service user privileges, enabling unauthorized access to USB device management functions.

🟢

If Mitigated

Minimal impact with proper access controls and service isolation in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of path traversal techniques. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version including commit 3ded00c9985a5108cfc7591a309f9a23d57a8cba or later

Vendor Advisory: https://lists.debian.org/debian-lts-announce/2025/12/msg00027.html

Restart Required: Yes

Instructions:

1. Update usbmuxd package from your distribution's repository. 2. Restart the usbmuxd service. 3. For Debian-based systems: sudo apt update && sudo apt upgrade usbmuxd. 4. For SUSE systems: use zypper or YaST to update usbmuxd package.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit which users have local shell access to systems running usbmuxd

Service isolation

linux

Run usbmuxd with minimal privileges using systemd or container isolation

sudo systemctl edit usbmuxd
Add: [Service]\nDynamicUser=yes\nPrivateTmp=yes\nProtectSystem=strict

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access the system locally
  • Monitor for suspicious activity involving usbmuxd service or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check usbmuxd version: usbmuxd --version or dpkg -l | grep usbmuxd or rpm -q usbmuxd

Check Version:

usbmuxd --version 2>/dev/null || dpkg -l usbmuxd 2>/dev/null || rpm -q usbmuxd 2>/dev/null

Verify Fix Applied:

Verify installed version includes commit 3ded00c9985a5108cfc7591a309f9a23d57a8cba or check package version is updated per vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual usbmuxd process activity
  • Failed privilege escalation attempts in system logs
  • Suspicious file access patterns involving usbmuxd

Network Indicators:

  • Local connections to usbmuxd socket from unexpected users

SIEM Query:

process_name="usbmuxd" AND (event_type="privilege_escalation" OR user_change=true)

🔗 References

📤 Share & Export