- Description
- A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
- Source
- info@cert.vde.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- info@cert.vde.com
- CWE-88
- Hype score
- Not currently trending
⚡ New CVE Alert: CVE-2025-41761 📊 Severity: 7.8 🚨 Risk Level: High 🧩 Affects: Multiple / Unspecified Products Reference: https://t.co/c3qH1f5Wwq #CVE-2025-41761 #CVE #High #CyberSecurity #InfoSec https://t.co/4MMOz335D9
@CVEarity
9 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-41761 Local Privilege Escalation in UBR Service Account via Sudo Permissions https://t.co/Q0nbuMmrsv
@VulmonFeeds
9 Mar 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes