CVE-2025-23395
Linux Fedora vulnerability analysis and mitigation

Overview

Screen 5.0.0 contains a critical security vulnerability (CVE-2025-23395) discovered in early 2025. When running with setuid-root privileges, the logfile_reopen() function fails to drop privileges while operating on user-supplied paths. The vulnerability specifically impacts systems where Screen is installed with setuid-root privileges, such as Arch Linux and NetBSD (SUSE Bugzilla, NVD).

Technical details

The vulnerability exists in the logfile_reopen() function when Screen runs with setuid-root privileges. The function fails to drop privileges while handling user-supplied paths, allowing unprivileged users to create files in arbitrary locations with root ownership, the invoking user's real group ownership, and file mode 0644. The issue was introduced through commit 441bca708bd which removed the lfsecreopen() function. The vulnerability has received a CVSS v3.1 base score of 7.8 (HIGH) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Wiz).

Impact

The vulnerability allows unprivileged users to create files in arbitrary locations with root ownership. All data written to the Screen PTY will be logged into this file, enabling privilege escalation to root. Attackers can exploit this by writing new configuration files for tools like sudo or by appending code to privileged shell scripts in system directories (SUSE Bugzilla, Wiz).

Mitigation and workarounds

The issue has been addressed by reintroducing secure file handling during logfile reopen. Distributions are advised not to install Screen with setuid-root privileges. For systems that require multi-user functionality, it is recommended to offer this feature only in an opt-in fashion, such as allowing only members of a trusted group to run a multi-user version of Screen (Openwall, Wiz).

Community reactions

A comprehensive security audit by the SUSE Security Team uncovered this vulnerability, leading to immediate responses from affected distributions. The discovery has prompted discussions about the security implications of setuid-root privileges in Screen installations (Security Online).

Additional resources


SourceThis report was generated using AI

Related Linux Fedora vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-24528HIGH7.1
  • KerberosKerberos
  • libkadm5
NoYesJan 16, 2026
CVE-2026-22857MEDIUM6.8
  • WolfiWolfi
  • freerdp2
NoYesJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • WolfiWolfi
  • libwinpr-devel
NoYesJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • WolfiWolfi
  • freerdp2
NoYesJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • WolfiWolfi
  • freerdp-debuginfo
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management