Description
HCL AION is affected by a vulnerability where generated containers may execute binaries with root-level privileges. Running containers with root privileges may increase the potential security risk, as it grants elevated permissions within the container environment. Aligning container configurations with security best practices requires minimizing privileges and avoiding root-level execution wherever possible.
Published: 2026-03-16
Score: 5.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Root-Level Execution in Containers
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in HCL AION allows generated containers to run binaries with root-level privileges, giving an attacker elevated permissions within the container. This can enable unauthorized access to sensitive data or further compromise the host system if the container escapes isolation. The issue is a privilege escalation flaw (CWE-345).

Affected Systems

HCL AION products are affected. All releases of the HCL AION platform that generate containers without proper privilege restrictions are vulnerable. Specific version details are not provided, so the risk applies to all supported installations until an update is applied.

Risk and Exploitability

The CVSS score of 5.6 indicates moderate severity, while the EPSS score of less than 1% shows a low probability of current exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require the ability to influence or create containers, suggesting that a local or privileged attacker could exploit the flaw. Applying an official patch reduces the attack surface and eliminates the privilege escalation path.

Generated by OpenCVE AI on March 27, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest HCL AION patch or update that addresses the container privilege issue.
  • Reconfigure HCL AION to ensure containers run with non-root user privileges.
  • Verify and enforce strict user and permission settings within container configurations.
  • Monitor container logs for signs of unauthorized privilege usage.
  • Keep the HCL AION system and its dependencies updated to stay protected against future vulnerabilities.

Generated by OpenCVE AI on March 27, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Hcltech
Hcltech aion
Vendors & Products Hcltech
Hcltech aion

Fri, 27 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Hcl
Hcl aion
CPEs cpe:2.3:a:hcl:aion:*:*:*:*:*:*:*:*
Vendors & Products Hcl
Hcl aion

Tue, 17 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Description HCL AION is affected by a vulnerability where container base images are not properly authenticated. This may expose the system to potential security risks such as usage of untrusted container images, which could lead to unintended behaviour or security impact. HCL AION is affected by a vulnerability where generated containers may execute binaries with root-level privileges. Running containers with root privileges may increase the potential security risk, as it grants elevated permissions within the container environment. Aligning container configurations with security best practices requires minimizing privileges and avoiding root-level execution wherever possible.

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-345
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description HCL AION is affected by a vulnerability where container base images are not properly authenticated. This may expose the system to potential security risks such as usage of untrusted container images, which could lead to unintended behaviour or security impact.
Title Multiple security vulnerabilities affect HCL AION
References
Metrics cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HCL

Published:

Updated: 2026-03-17T10:57:54.993Z

Reserved: 2025-06-18T14:00:43.106Z

Link: CVE-2025-52638

cve-icon Vulnrichment

Updated: 2026-03-16T14:44:47.711Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:59.610

Modified: 2026-03-27T17:27:23.670

Link: CVE-2025-52638

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T08:00:23Z

Weaknesses