CVE-2025-27591
Rust vulnerability analysis and mitigation

Overview

A privilege escalation vulnerability was discovered in Below, a Linux tool for recording and displaying system data, tracked as CVE-2025-27591. The vulnerability affects versions prior to v0.9.0 and stems from incorrect permission assignments in the system. The issue was discovered in January 2025 and publicly disclosed on March 12, 2025 (SecurityOnline, OpenWall).

Technical details

The vulnerability exists due to the Below service creating a world-writable directory at /var/log/below with 0777 permissions. The service runs with root privileges and attempts to ensure the directory has these permissions even if it already exists. The behavior varies across Linux distributions: in openSUSE Tumbleweed and Gentoo Linux, the directory is created with mode 01755; in Fedora Linux, it's packaged with 01777 permissions; and in Arch Linux AUR, the directory is created with mode 0777. Additionally, Below creates a log file at /var/log/below/error_root.log with mode 0666 permissions (OpenWall). The vulnerability has been assigned a CVSS score of 7.8 (SecurityOnline).

Impact

The vulnerability allows local unprivileged users to escalate their privileges to root through symlink attacks. An attacker can manipulate files such as /etc/shadow by exploiting the world-writable permissions. The world-readable permissions applied by Below under /var/log/below could also lead to information leaks, and an unprivileged user can pre-create this directory and control its contents, potentially violating Below's integrity (SecurityOnline).

Mitigation and workarounds

The vulnerability has been patched in Below version 0.9.0. Users are advised to upgrade to this version. As a temporary workaround, users can manually change the permissions on /var/log/below to more restrictive settings (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management