Impact
The vulnerability is a local privilege escalation in systemd versions 259 and earlier, caused by the varlink interface in systemd-machined that allows access to the root namespace. The weakness is an improper use of authorization mechanisms (CWE-863) combined with insufficient privilege management (CWE-266). An attacker with local access can direct the systemd-machined service to perform privileged operations, potentially altering system configuration or accessing sensitive data.
Affected Systems
The affected vendor is systemd, product systemd. Versions affected are 259 or earlier, prior to the 260 release.
Risk and Exploitability
The CVSS score of 6.7 indicates a medium‑high severity, while the EPSS score of less than 1 % suggests a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, and it requires local access; therefore an attacker must already have some foothold on the machine to exploit it. Though the likelihood of exploitation in the wild may be low, the potential impact of privilege escalation warrants timely remediation.
OpenCVE Enrichment