CVE-2025-41761
Privilege escalation possible
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
| CWE | CWE-88 |
| Vendor | mbs |
| Product | ubr-01 mk ii |
| Published | Mar 9, 2026 |
| Last Updated | Mar 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for mbs ubr-01 mk ii
Be the first to know when new high vulnerabilities affecting mbs ubr-01 mk ii are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
MBS / UBR-01 Mk II
0.0.0 < 6.0.1.0
MBS / UBR-02
0.0.0 < 6.0.1.0
MBS / UBR-LON
0.0.0 < 6.0.1.0
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse