CVE-2025-46802
Linux Debian vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Screen software (CVE-2025-46802) that allows TTY hijacking during attachment to a multiuser session. The issue was found when the multiattach flag is set, where the software temporarily sets the TTY to mode 666, creating a security risk. This vulnerability affects Screen version 5.0.0 and older versions, with a disclosure date of May 12, 2025 (OpenWall).

Technical details

The vulnerability exists in the Attach() function when the multiattach flag is set. The function performs a chmod() of the current TTY to mode 0666, which temporarily makes the TTY world-readable and writable. While the TTY path is properly validated using isatty() checks and /dev path verification, the temporary permission change creates a race condition. The vulnerability has received a CVSS v3.1 Base Score of 6.0 (MEDIUM) with vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N (NVD).

Impact

The vulnerability allows attackers to intercept data typed into the TTY and inject data into it during the window of exposure. An attacker could potentially mislead users into entering sensitive information like passwords, or inject control sequences to confuse the victim or exploit terminal emulator vulnerabilities. In some cases, the original TTY mode is never restored, leaving the terminal permanently exposed (OpenWall).

Mitigation and workarounds

The vulnerability has been addressed by removing the temporary chmod() calls, as they are considered remnants of past implementations. Modern versions of Screen pass the PTY file descriptor securely via UNIX domain socket to the target session. While this fix may affect some reattach use cases, these cases were already broken in previous versions. It's recommended to avoid installing Screen with setuid-root privileges (OpenWall).

Community reactions

The vulnerability was initially shared with the distros mailing list on April 30, 2025, and public disclosure occurred on May 12, 2025. The issue has affected multiple distributions including Arch Linux, Fedora, Gentoo Linux, FreeBSD, and NetBSD, leading to various responses from the security community. Some distributions have already implemented fixes by explicitly passing safe PTY modes during configuration (OpenWall).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59030HIGH7.5
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-59029MEDIUM5.3
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management