CVE-2025-12801
Privilege Escalation in nfs-utils rpc.mountd via NFSv3 Mount Access
Publication date: 2026-03-04
Last updated on: 2026-04-02
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 6.0 |
| redhat | enterprise_linux | 8.0 |
| redhat | openshift_container_platform | 4.0 |
| redhat | enterprise_linux | 9.0 |
| redhat | enterprise_linux | 10.0 |
| linux-nfs | nfs-utils | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
| CWE-279 | While it is executing, the product sets the permissions of an object in a way that violates the intended permissions that have been specified by the user. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2025-12801 is a vulnerability in the rpc.mountd daemon of the nfs-utils package on Linux systems.'}, {'type': 'paragraph', 'content': 'This flaw allows an NFSv3 client to escalate its privileges during the mount operation by bypassing the restrictions defined in the /etc/exports file.'}, {'type': 'paragraph', 'content': "Specifically, the client can gain unauthorized access to any subdirectory or subtree within an exported directory, ignoring the file permissions and security attributes such as 'root_squash' or 'all_squash' that are normally enforced to limit client privileges."}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability allows an NFSv3 client to bypass normal access controls and gain unauthorized access to subdirectories or subtrees within exported directories.'}, {'type': 'paragraph', 'content': 'As a result, an attacker or malicious client could access sensitive files or data that should be restricted, potentially leading to data exposure.'}, {'type': 'paragraph', 'content': "The vulnerability ignores file permissions and security attributes like 'root_squash' or 'all_squash', which normally help protect against privilege escalation."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know