Privilege Escalation via User-Supplied Socket Pathname in seatd 0.6.x before 0.6.4

Privilege Escalation via User-Supplied Socket Pathname in seatd 0.6.x before 0.6.4

CVE-2022-25643 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.

Learn more about our User Device Pen Test.