- Description
- The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings that allow a local user to escalate their privileges to root.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 9.3
- Impact score
- 6
- Exploitability score
- 2.5
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- cve@mitre.org
- CWE-863
- Hype score
- Not currently trending
🟥 CVE-2025-53391, CVSS: 9.3 (#Critical) #zuluCrypt version 6.2.0-1, #Debian local privilege escalation #vulnerability due to insecure PolicyKit settings in #zuluPolkit, allows any local user to escalate privileges to root #CyberSecurity #CVE https://t.co/vdR7bPxy0v https:/
@UjlakiMarci
29 Jun 2025
126 Impressions
0 Retweets
1 Like
0 Bookmarks
2 Replies
0 Quotes
🚨 Critical #Linux vuln in Debian's zuluPolkit (CVE-2025-53391): Any local user can get root access using just their own password. A patch meant to help… made it worse. Full breakdown here 👉 https://t.co/mmOk1q75GI #infosec #Debian #LPE https://t.co/9AbJeCdbyE
@TheHackerWire
28 Jun 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-53391 The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings th… https://t.co/wspbSwleUQ
@CVEnew
28 Jun 2025
598 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes