CVE-2025-57854
Osus-operator: privilege escalation via excessive /etc/passwd permissions
CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th
A container privilege escalation flaw was found in certain OpenShift Update Service (OSUS) images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
| CWE | CWE-276 |
| Vendor | red hat |
| Product | red hat openshift update service |
| Published | Apr 8, 2026 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for red hat red hat openshift update service
Be the first to know when new medium vulnerabilities affecting red hat red hat openshift update service are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat OpenShift Update Service
All versions affected References
Credits
Red Hat would like to thank Antony Di Scala and Michael Whale for reporting this issue.