CVE-2025-12381
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-17

Assigner: AlgoSec

Description
Improper Privilege Management vulnerability in AlgoSec Firewall Analyzer on Linux, 64 bit allows Privilege Escalation, Parameter Injection. A local user with access to the command line may escalate their privileges by abusing the parameters of a command that is approved in the sudoers file.  This issue affects Firewall Analyzer: A33.0, A33.10.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-17
Generated
2026-05-06
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
algosec firewall_analyzer a33.10
algosec firewall_analyzer 4.0
algosec firewall_analyzer a33.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Improper Privilege Management issue in AlgoSec Firewall Analyzer on Linux (64 bit). It allows a local user who has command line access to escalate their privileges by exploiting parameters of a command that is approved in the sudoers file. Essentially, the user can gain higher privileges than intended by abusing how command parameters are handled.


How can this vulnerability impact me? :

This vulnerability can allow a local user to escalate their privileges on the affected system, potentially gaining unauthorized access to sensitive functions or data. This could lead to unauthorized changes, data exposure, or further compromise of the system's security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the sudoers file for misconfigured entries related to AlgoSec Firewall Analyzer commands that allow parameter injection. Specifically, look for sudoers entries permitting commands without proper parameter restrictions. For example, you can run: sudo -l -U <username> to list allowed sudo commands for a user and inspect if any commands are vulnerable. Additionally, verify the installed version of AlgoSec Firewall Analyzer to see if it is A33.0 (build below 330) or A33.10 (build below 230), which are affected versions. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade AlgoSec Firewall Analyzer to the fixed versions: A33.0 build 330 or above, or A33.10 build 230 or above, where the sudoers misconfigurations have been corrected. Until the upgrade is applied, restrict local user access to the command line and review sudoers entries to remove or limit commands that allow parameter injection. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart