A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.
History

Thu, 15 May 2025 04:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 14 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 May 2025 12:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.
Title Yggdrasil: local privilege escalation in yggdrasil
First Time appeared Redhat
Redhat enterprise Linux
Redhat satellite
Weaknesses CWE-280
CPEs cpe:/a:redhat:satellite:6
cpe:/o:redhat:enterprise_linux:10.0
Vendors & Products Redhat
Redhat enterprise Linux
Redhat satellite
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-05-14T13:27:01.903Z

Reserved: 2025-04-25T12:24:04.851Z

Link: CVE-2025-3931

cve-icon Vulnrichment

Updated: 2025-05-14T13:26:57.471Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-14T12:15:19.493

Modified: 2025-05-16T14:43:56.797

Link: CVE-2025-3931

cve-icon Redhat

Severity : Important

Publid Date: 2025-05-14T00:00:00Z

Links: CVE-2025-3931 - Bugzilla