A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 18:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
Title amq: privilege escalation via excessive /etc/passwd permissions Amq: privilege escalation via excessive /etc/passwd permissions
First Time appeared Redhat
Redhat amq Broker
Redhat rhosemc
CPEs cpe:/a:redhat:amq_broker:7
cpe:/a:redhat:rhosemc:1.0::el9
Vendors & Products Redhat
Redhat amq Broker
Redhat rhosemc
References

Wed, 08 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title amq: privilege escalation via excessive /etc/passwd permissions
Weaknesses CWE-276
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L'}

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-22T18:44:00.684Z

Reserved: 2025-09-03T15:20:52.036Z

Link: CVE-2025-58712

cve-icon Vulnrichment

Updated: 2025-10-22T18:36:57.927Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-22T19:15:34.270

Modified: 2025-10-22T21:12:32.330

Link: CVE-2025-58712

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-07T14:26:00Z

Links: CVE-2025-58712 - Bugzilla

cve-icon OpenCVE Enrichment

No data.