๐Ÿ” CVE Alert

CVE-2025-57852

MEDIUM 6.4

Openshift-ai: privilege escalation via excessive /etc/passwd permissions

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

A container privilege escalation flaw was found in KServe ModelMesh container images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

CWE CWE-276
Vendor red hat
Product red hat openshift ai 2.16
Published Sep 30, 2025
Last Updated Mar 6, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat openshift ai 2.16

Be the first to know when new medium vulnerabilities affecting red hat red hat openshift ai 2.16 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat OpenShift AI 2.16
All versions affected
Red Hat / Red Hat OpenShift AI 2.19
All versions affected
Red Hat / Red Hat OpenShift AI 2.21
All versions affected
Red Hat / Red Hat OpenShift AI 2.22
All versions affected
Red Hat / Red Hat OpenShift AI 2.24
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:16981 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:16982 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:16983 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:16984 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:17501 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-57852 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2391105

Credits

Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.