CVE-2025-68462

3.2 LOW

📋 TL;DR

Freedombox versions before 25.17.1 have improper permissions on the backups-data directory, allowing unauthorized users to read database dump files. This affects all Freedombox installations running vulnerable versions, potentially exposing sensitive database information.

💻 Affected Systems

Products:
  • Freedombox
Versions: All versions before 25.17.1
Operating Systems: Debian-based Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default Freedombox installations where the backups-data directory exists and contains database dumps.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to database dumps containing sensitive user data, credentials, or configuration information, leading to data breaches or credential theft.

🟠

Likely Case

Local users or processes with limited access can read database backup files, potentially exposing application data or configuration details.

🟢

If Mitigated

With proper directory permissions, only authorized backup processes can access the database dump files, preventing data exposure.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the filesystem, making direct internet exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal users or compromised services with filesystem access could exploit this to read sensitive database backups.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires filesystem access to read the directory contents, which typically means local user access or compromised service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.17.1

Vendor Advisory: https://salsa.debian.org/freedombox-team/freedombox/-/commit/8ba444990b4af6eec4b6b2b26482b107d

Restart Required: No

Instructions:

1. Update Freedombox to version 25.17.1 or later using apt. 2. Run: sudo apt update && sudo apt upgrade freedombox. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Manual directory permission fix

linux

Manually set proper permissions on the backups-data directory to restrict access.

sudo chmod 700 /var/lib/freedombox/backups-data
sudo chown freedombox:freedombox /var/lib/freedombox/backups-data

🧯 If You Can't Patch

  • Restrict filesystem access to the backups-data directory using appropriate permissions.
  • Implement network segmentation to limit which systems can access the Freedombox server.

🔍 How to Verify

Check if Vulnerable:

Check Freedombox version with: dpkg -l | grep freedombox. If version is earlier than 25.17.1, check directory permissions: ls -la /var/lib/freedombox/backups-data

Check Version:

dpkg -l | grep freedombox

Verify Fix Applied:

Verify Freedombox version is 25.17.1 or later and check directory permissions show restricted access (drwx------).

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /var/lib/freedombox/backups-data directory
  • Failed permission checks in system logs

Network Indicators:

  • N/A - This is a local filesystem vulnerability

SIEM Query:

source="system" AND (path="/var/lib/freedombox/backups-data/*" OR process="cat" OR process="less" OR process="head" OR process="tail")

🔗 References

📤 Share & Export