Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. | |
| Title | Privilege escalation possible | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-09T20:14:04.600Z
Reserved: 2025-04-16T11:18:45.760Z
Link: CVE-2025-41761
Updated: 2026-03-09T20:04:15.345Z
Status : Awaiting Analysis
Published: 2026-03-09T09:16:00.263
Modified: 2026-03-09T13:35:07.393
Link: CVE-2025-41761
No data.
OpenCVE Enrichment
No data.