CVE-2025-8067

8.5 HIGH

📋 TL;DR

CVE-2025-8067 is an out-of-bounds read vulnerability in the Udisks daemon that allows unprivileged local users to create loop devices with negative index values via D-BUS. This can lead to daemon crashes or local privilege escalation by accessing privileged user files. Affected systems include Linux distributions running vulnerable Udisks versions.

💻 Affected Systems

Products:
  • Udisks
  • Udisks2
Versions: Versions prior to 2.10.1
Operating Systems: Linux distributions including RHEL, Fedora, Ubuntu, Debian, CentOS
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Udisks daemon running and D-BUS interface accessible to local users are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation allowing unprivileged users to gain root access and access sensitive system files.

🟠

Likely Case

Denial of service through Udisks daemon crashes and potential information disclosure from privileged files.

🟢

If Mitigated

Limited impact with proper access controls and SELinux/apparmor policies restricting D-BUS access.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local user access.
🏢 Internal Only: HIGH - Any local user on affected systems can potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access and knowledge of D-BUS interface calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Udisks 2.10.1 or later

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:15017

Restart Required: Yes

Instructions:

1. Update Udisks package using system package manager. 2. For RHEL/CentOS: 'yum update udisks2'. 3. For Ubuntu/Debian: 'apt update && apt upgrade udisks2'. 4. Restart the Udisks daemon or reboot system.

🔧 Temporary Workarounds

Restrict D-BUS access

linux

Limit D-BUS interface access to Udisks daemon for non-privileged users

systemctl mask udisks2.service
chmod 750 /usr/libexec/udisks2/udisksd

Disable loop device creation

linux

Prevent loop device creation via Udisks policy

Create /etc/dbus-1/system.d/udisks2.conf with restricted permissions

🧯 If You Can't Patch

  • Implement strict SELinux/apparmor policies to restrict Udisks daemon capabilities
  • Monitor for suspicious D-BUS calls to Udisks interface and restrict user access to D-BUS system

🔍 How to Verify

Check if Vulnerable:

Check Udisks version: 'udisksctl --version' or 'rpm -q udisks2' or 'dpkg -l | grep udisks2'

Check Version:

udisksctl --version

Verify Fix Applied:

Verify version is 2.10.1 or later and test D-BUS interface with negative index values

📡 Detection & Monitoring

Log Indicators:

  • Udisks daemon crashes in system logs
  • Failed D-BUS calls with negative parameters
  • Unauthorized loop device creation attempts

Network Indicators:

  • Local D-BUS traffic spikes to Udisks service

SIEM Query:

source="systemd" AND "udisksd" AND ("segmentation fault" OR "crash" OR "aborted")

🔗 References

📤 Share & Export