Critical Linux Vulnerabilities Grant Full Root Access via PAM and Udisks Across Major Distributions

June 19, 2025
Linux / Vulnerability

Cybersecurity researchers have identified two local privilege escalation (LPE) vulnerabilities that could potentially provide root access on various major Linux distributions. The issues, revealed by Qualys, are detailed below:

  • CVE-2025-6018: LPE from unprivileged to allow_active in Pluggable Authentication Modules (PAM) for SUSE 15
  • CVE-2025-6019: LPE from allow_active to root in libblockdev through the udisks daemon

“These modern ‘local-to-root’ vulnerabilities have bridged the divide between a regular user and complete system control,” stated Saeed Abbasi, Senior Manager at Qualys Threat Research Unit (TRU). “By leveraging legitimate services like udisks loop-mounts and PAM/environment intricacies, attackers with any active GUI or SSH session can bypass polkit’s allow_active trust zone and gain root access within seconds.”

Qualys noted that CVE-2025-6018 is found in the PAM configuration of openSUSE Leap…

Critical Linux Vulnerabilities Expose Root Access Risks Across Major Distributions

June 19, 2025

In a significant cybersecurity development, researchers from Qualys have identified two local privilege escalation vulnerabilities that could be exploited to attain root access on systems using prominent Linux distributions. These security flaws, tagged as CVE-2025-6018 and CVE-2025-6019, could pose serious risks to organizations that rely on these systems for their operational infrastructure.

CVE-2025-6018 involves a local privilege escalation exploit within the Pluggable Authentication Modules (PAM) configurations found in openSUSE Leap 15. This vulnerability allows an unprivileged user to manipulate PAM’s functionalities to gain enhanced permissions. The second vulnerability, CVE-2025-6019, allows an escalation from a privileged state to root-level access through libblockdev via the udisks daemon. The combination of these flaws essentially enables attackers to bypass critical security measures.

Saeed Abbasi, Senior Manager at Qualys Threat Research Unit, emphasized the seriousness of these vulnerabilities, stating that they have effectively narrowed the divide between an ordinary user session and complete system control. By leveraging legitimate services such as udisks for loop-mounting and various PAM environment quirks, an attacker can quickly exploit these flaws. If a user is logged in through a graphical interface or SSH, the potential to escalate privileges to root in a matter of seconds becomes starkly evident.

The implications of these vulnerabilities are extensive, particularly for companies operating environments dependent on Linux distributions. The blending of actual services with inherent system weaknesses creates a tempting opportunity for adversaries. Affected organizations must remain vigilant, given that successful exploitation could lead not only to unauthorized access but also to compromised data integrity and availability.

As businesses increasingly adopt cloud solutions and remote work infrastructures—often relying on Linux-based systems for their operations—understanding these vulnerabilities becomes vital. The risk associated with privilege escalation is critical, as it can allow attackers to maintain persistence within a system after gaining initial access.

Referencing the MITRE ATT&CK Matrix, the tactics and techniques relevant to this situation fall under privilege escalation, as attackers exploit these vulnerabilities to elevate their access rights. Organizations must prioritize patching these flaws and fortifying their authentication frameworks. Additionally, continuous monitoring of user sessions and system configurations can serve as crucial defensive strategies.

With a growing trend of cyber threats targeting local systems, it is essential for business owners to not only invest in robust cybersecurity measures but also to establish a culture of awareness regarding digital risks. Remaining informed about these vulnerabilities is a vital step in safeguarding critical business assets against evolving cyber threats, especially in the context of increasing remote operations and digital transformation initiatives.

Source link