Below Service, Privilege Escalation, CVE-2025-27591 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-27591 is a privilege escalation vulnerability in Below service versions before v0.9.0. The service creates a world-writable directory at /var/log/below, allowing local unprivileged users to manipulate files via symlink attacks. By exploiting this misconfiguration, an attacker could overwrite critical system files like /etc/shadow, leading to root privilege escalation. The vulnerability stems from improper directory permissions and insufficient validation of symbolic links, enabling malicious users to redirect file operations to sensitive locations.

DailyCVE Form

Platform: Below Service
Version: < v0.9.0
Vulnerability: Privilege Escalation
Severity: Critical
Date: 07/03/2025

Prediction: Patch by 08/15/2025

What Undercode Say

Check Below service version
below --version
Verify directory permissions
ls -ld /var/log/below
Exploit PoC (hypothetical)
ln -s /etc/shadow /var/log/below/malicious_log
echo "malicious_content" > /var/log/below/malicious_log

How Exploit

1. Identify Below service version (< v0.9.0).

2. Confirm `/var/log/below` is world-writable.

3. Create symlink to sensitive file (e.g., `/etc/shadow`).

4. Write malicious content via the symlink.

Protection from this CVE

  • Update to Below v0.9.0+.
  • Restrict `/var/log/below` permissions (e.g., chmod 750).
  • Disable symlink following in service config.

Impact

  • Full root access compromise.
  • Unauthorized system modifications.
  • Potential persistence mechanisms.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top