{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12381","assignerOrgId":"ca5f073f-8266-4d43-b3e3-6eb0bb18a738","state":"PUBLISHED","assignerShortName":"AlgoSec","dateReserved":"2025-10-28T09:05:51.106Z","datePublished":"2025-12-09T13:41:53.393Z","dateUpdated":"2025-12-09T14:26:01.398Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux","64 bit"],"product":"Firewall Analyzer","vendor":"AlgoSec","versions":[{"status":"affected","version":"A33.0 (up to build 320)"},{"status":"affected","version":"A33.10 (up to build 220)"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:algosec:firewall_analyzer:a33.0:*:linux:*:*:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:algosec:firewall_analyzer:a33.0:*:64_bit:*:*:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:algosec:firewall_analyzer:a33.10:*:linux:*:*:*:*:*","vulnerable":true},{"criteria":"cpe:2.3:a:algosec:firewall_analyzer:a33.10:*:64_bit:*:*:*:*:*","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Charlie Lindholm"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Privilege Management vulnerability in AlgoSec Firewall Analyzer on Linux, 64 bit allows&nbsp;Privilege Escalation, Parameter Injection.<br><br>A local user with access to the command line may escalate their privileges by abusing the parameters of a command that is approved in the sudoers file.&nbsp;<br><p>This issue affects Firewall Analyzer: A33.0, A33.10.</p>"}],"value":"Improper Privilege Management vulnerability in AlgoSec Firewall Analyzer on Linux, 64 bit allows Privilege Escalation, Parameter Injection.\n\nA local user with access to the command line may escalate their privileges by abusing the parameters of a command that is approved in the sudoers file. \nThis issue affects Firewall Analyzer: A33.0, A33.10."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]},{"capecId":"CAPEC-137","descriptions":[{"lang":"en","value":"CAPEC-137 Parameter Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"YES","Recovery":"USER","Safety":"NEGLIGIBLE","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"LOCAL","baseScore":6.1,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"ACTIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:U/RE:L/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"ca5f073f-8266-4d43-b3e3-6eb0bb18a738","shortName":"AlgoSec","dateUpdated":"2025-12-09T13:41:53.393Z"},"references":[{"url":"https://techdocs.algosec.com/en/cves/Content/tech-notes/cves/cve-2025-12381.htm"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Upgrade ASMS suite to A33.0&nbsp;(build 330 and above), A33.10 (build 230 and above).<br><a target=\"_blank\" rel=\"nofollow\" href=\"https://portal.algosec.com/en/downloads/hotfix_releases\">https://portal.algosec.com/en/downloads/hotfix_releases</a><br>"}],"value":"Upgrade ASMS suite to A33.0 (build 330 and above), A33.10 (build 230 and above).\n https://portal.algosec.com/en/downloads/hotfix_releases"}],"source":{"discovery":"UNKNOWN"},"title":"Privilege Escalation via Misconfigured Sudoers Entry for Local Users in AlgoSec Firewall Analyzer","x_generator":{"engine":"Vulnogram 0.4.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:25:52.884477Z","id":"CVE-2025-12381","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T14:26:01.398Z"}}]}}