{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5199","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2025-05-26T12:29:30.522Z","datePublished":"2025-07-11T23:21:30.996Z","dateUpdated":"2025-07-14T20:12:58.921Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","packageName":"Multipass","platforms":["MacOS"],"product":"Multipass","repo":"https://github.com/canonical/multipass","vendor":"Canonical","versions":[{"lessThan":"1.16.0","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Isaac Ordonez"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup."}],"value":"In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-276","description":"CWE-276 Incorrect Default Permissions","lang":"en","type":"CWE"}]}],"references":[{"tags":["vendor-advisory"],"url":"https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3"},{"tags":["patch"],"url":"https://github.com/canonical/multipass/pull/4115"}],"source":{"discovery":"EXTERNAL"},"title":"LPE on Multipass for macOS","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2025-07-11T23:21:30.996Z"}},"adp":[{"references":[{"url":"https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-14T14:45:10.993022Z","id":"CVE-2025-5199","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-14T20:12:58.921Z"}}]}}