CVE-2025-67603
Improper Authorization in Foomuuri Allows Firewall Configuration Manipulation
Publication date: 2026-01-08
Last updated on: 2026-01-08
Assigner: SUSE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foomuuri | foomuuri | 0.31 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not explicitly discuss the impact of CVE-2025-67603 on compliance with common standards and regulations such as GDPR or HIPAA. However, since the vulnerability allows unauthorized local users to modify firewall configurations, potentially weakening firewall rules and causing integrity loss, it could indirectly affect compliance by compromising network security controls required by such regulations. No direct statements about compliance impact are given. [1, 2]
Can you explain this vulnerability to me?
CVE-2025-67603 is a security vulnerability in the Foomuuri firewall manager's D-Bus interface. It arises because the D-Bus service lacks proper authentication and authorization, allowing any local user, including unprivileged accounts, to access and invoke methods that modify the firewall configuration. Additionally, input validation on parameters like network interface names is insufficient, enabling attackers to manipulate firewall settings arbitrarily. This can lead to unauthorized changes in firewall zones and configurations, potentially compromising firewall integrity and security. [1, 2]
How can this vulnerability impact me? :
This vulnerability allows any local user, even those without privileges, to modify the firewall configuration on a system running Foomuuri. Such unauthorized changes can weaken firewall rules, misassign network interfaces to zones, or cause limited denial-of-service conditions. It may also lead to integrity loss of the firewall configuration and could enable privilege escalation depending on nftables features. Overall, it compromises the security posture of the affected system by allowing attackers to bypass firewall protections. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the Foomuuri D-Bus service is running without proper authorization controls, allowing any local user to access and invoke its methods. You can inspect the D-Bus services for the presence of the Foomuuri interface (e.g., "fi.foobar.Foomuuri1") and test if unprivileged users can call methods like "addInterface" to modify firewall configurations. Commands to check the D-Bus services include: 1) List Foomuuri D-Bus services: `busctl list | grep Foomuuri` or `dbus-send --system --dest=fi.foobar.Foomuuri1 --print-reply --type=method_call /fi/foobar/Foomuuri1 fi.foobar.Foomuuri1.SomeMethod` (replace SomeMethod with actual method names). 2) Attempt to call D-Bus methods as an unprivileged user to verify if authorization is enforced. 3) Check the firewall configuration files for unexpected changes or interface assignments. Additionally, review systemd service files for Foomuuri to see if Polkit authorization is enabled and if the umask is set securely. These steps help detect if the vulnerability is present and exploitable on your system. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Upgrade Foomuuri to version 0.31 or later, where the vulnerability is patched. 2) Ensure that Polkit-based authentication is enabled for the Foomuuri D-Bus service to restrict access to authorized users only. 3) Validate and restrict interface parameters to disallow whitespace, special characters, and enforce length limits. 4) Change the daemonize umask to 0o022 to prevent insecure file permissions. 5) Apply systemd service hardening options such as ProtectSystem=full to reduce privilege escalation risks. If upgrading immediately is not possible, restrict local user access to the D-Bus interface by adjusting D-Bus configuration files or system permissions to prevent unprivileged users from connecting to the Foomuuri service. [1, 2]