CVE-2025-67858

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to manipulate JSON configuration data passed to nftables (nft) through Foomuuri, potentially leading to firewall rule modification or other unspecified impacts. It affects Foomuuri installations before version 0.31. The vulnerability stems from improper neutralization of argument delimiters in JSON input.

💻 Affected Systems

Products:
  • Foomuuri
Versions: All versions before 0.31
Operating Systems: Linux distributions using Foomuuri (primarily SUSE/openSUSE)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires access to Foomuuri's D-Bus interface or ability to pass manipulated JSON to nft through Foomuuri.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall configuration compromise allowing network traffic redirection, service disruption, or potential privilege escalation through manipulated nft rules.

🟠

Likely Case

Unauthorized modification of firewall rules leading to network access control bypass or service interruption.

🟢

If Mitigated

Limited impact if proper input validation and D-Bus authorization are implemented, restricting configuration changes to authorized users only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to Foomuuri's D-Bus interface or ability to influence JSON configuration input. The lack of D-Bus authorization mentioned in references suggests potential privilege escalation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.31 or later

Vendor Advisory: https://security.opensuse.org/2026/01/07/foomuuri-lack-of-dbus-authorization.html

Restart Required: Yes

Instructions:

1. Update Foomuuri to version 0.31 or later using your distribution's package manager. 2. For SUSE/openSUSE: 'sudo zypper update foomuuri'. 3. Restart Foomuuri service: 'sudo systemctl restart foomuuri'.

🔧 Temporary Workarounds

Restrict D-Bus access

linux

Implement D-Bus policy restrictions to limit which users/processes can interact with Foomuuri's interface

sudo nano /etc/dbus-1/system.d/org.foomuuri.conf
Add appropriate <policy> restrictions for user/group access

Disable Foomuuri if not needed

linux

Stop and disable the Foomuuri service if firewall management through this tool is not required

sudo systemctl stop foomuuri
sudo systemctl disable foomuuri

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to systems running vulnerable Foomuuri versions
  • Monitor nftables configuration changes and D-Bus activity for unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check Foomuuri version: 'foomuuri --version' or 'rpm -q foomuuri' (SUSE) or check package manager. If version is below 0.31, system is vulnerable.

Check Version:

foomuuri --version || rpm -q foomuuri || dpkg -l | grep foomuuri

Verify Fix Applied:

Verify Foomuuri version is 0.31 or later: 'foomuuri --version'. Check that D-Bus policies are properly configured if using workaround.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected nftables configuration changes in system logs
  • D-Bus authentication failures or unauthorized access attempts to org.foomuuri interface
  • JSON parsing errors in Foomuuri logs

Network Indicators:

  • Unexpected firewall rule changes affecting network traffic patterns
  • Unauthorized network access through modified firewall rules

SIEM Query:

source="foomuuri.log" AND ("configuration change" OR "JSON error" OR "authentication failure") OR source="dbus.log" AND destination="org.foomuuri"

🔗 References

📤 Share & Export