- Description
- By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to privilege checks. If a privileged user within a jail is able to nullfs-mount directories, a limitation of the kernel's path lookup logic allows that user to escape the jail's chroot, yielding access to the full filesystem of the host or parent jail. In a jail configured to allow nullfs(4) mounts from within the jail, the jailed root user can escape the jail's filesystem root.
- Source
- secteam@freebsd.org
- NVD status
- Analyzed
- Products
- freebsd
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 6
- Exploitability score
- 2
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
- secteam@freebsd.org
- CWE-269
- Hype score
- Not currently trending
CVE-2025-15547 By default, jailed processes cannot mount filesystems, including nullfs(4). However, the allow.mount.nullfs option enables mounting nullfs filesystems, subject to pr… https://t.co/PBo2J7ucit
@CVEnew
9 Mar 2026
87 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-15547 Jail Escape Vulnerability in FreeBSD via NullFS Mount Path Lookup Logic https://t.co/FSgA3ILuri
@VulmonFeeds
9 Mar 2026
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The severity is increased for this new vulnerability affecting FreeBSD (CVE-2025-15547) https://t.co/EPDgDaNNQh
@vuldb
9 Mar 2026
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
multiple jail escapes in freebsd in the past month -neither of which being flagged in your favorite scanners - CVE-2025-15576 , CVE-2025-15547 If you stronger isolation - you need unikernels. https://t.co/8UMDkVw8WN
@nanovms
24 Feb 2026
157 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:-:*:*:*:*:*:*",
"matchCriteriaId": "947F561E-AD65-43B9-94C1-3109A3D35248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "3D1987F1-1E08-4B28-8D16-D25A091D99ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "BEC1E8A0-0402-45F1-938D-FEFDCFC3E747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p3:*:*:*:*:*:*",
"matchCriteriaId": "D94457D6-738F-4ABB-BD46-F2B621531FE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p4:*:*:*:*:*:*",
"matchCriteriaId": "8C38CB56-B80C-4D1B-9267-16E8F985B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p5:*:*:*:*:*:*",
"matchCriteriaId": "13DF1E38-5E8D-42FF-A4C5-092300864F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p6:*:*:*:*:*:*",
"matchCriteriaId": "83A86F81-0965-4600-835A-496756137998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p7:*:*:*:*:*:*",
"matchCriteriaId": "987E31A4-7E21-471E-A3EA-4E53FFDB3DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p8:*:*:*:*:*:*",
"matchCriteriaId": "9FBFE8B3-DC7C-4394-B062-C40E201EC059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:*",
"matchCriteriaId": "9DC7C54E-58AF-4ADE-84AF-0EF0F325E20E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "D3D22B8C-36CF-4800-9673-0B0240558BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "242FA2A8-5D7D-4617-A411-2651FF3A3E4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:*",
"matchCriteriaId": "40573F60-F3B7-4AEC-846A-B08E5B7D9D00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:*",
"matchCriteriaId": "1FB832CE-0A98-44A2-8BAC-CD38A64279B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:*",
"matchCriteriaId": "9A785F8E-C218-41AE-8D57-BF06DDAEF7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:*",
"matchCriteriaId": "C3909FDD-B2A2-45B6-A40B-1D303A717F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p7:*:*:*:*:*:*",
"matchCriteriaId": "720597A2-F181-46E1-8A0D-097E17ADC4FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]