CVE-2025-53391
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-53391 affects the Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through version zulucrypt6.2.0-1 package. The vulnerability was discovered on June 25, 2025, and stems from insecure PolicyKit allowany/allowinactive/allowactive settings that enable local users to escalate their privileges to root. The issue affects multiple Debian releases including Debian 12 (Bookworm), Debian Trixie, and Debian Sid (Debian Bug, NVD).

Technical details

The vulnerability exists in a Debian-specific patch that modifies zuluPolkit's default behavior to allow any user to utilize the utility, rather than restricting it to admin users as intended by upstream. zuluPolkit operates using a combination of a UNIX socket and standard input, accepting JSON payloads that can execute privileged commands. The vulnerability has been assigned a CVSS v3.1 base score of 9.3 CRITICAL with vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (Wiz, NVD).

Impact

The vulnerability allows any local user to escalate their privileges to root access by exploiting zuluPolkit's file manipulation capabilities. An attacker can read and modify sensitive system files, including /etc/shadow, potentially gaining complete control over the affected system. The vulnerability affects all installations where the zulucrypt-gui package is installed (Debian Bug).

Mitigation and workarounds

The recommended mitigation is to remove the problematic patch that modifies zuluPolkit's PolicyKit configuration. The upstream default behavior of restricting zuluPolkit access to admin users is considered a security feature rather than a bug. System administrators should consider removing or restricting access to the zulucrypt-gui package until a fix is available (Wiz).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66570CRITICAL10
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoDec 05, 2025
CVE-2025-66471HIGH8.9
  • PythonPython
  • urllib3
NoYesDec 05, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-pure-java
NoYesDec 05, 2025
CVE-2025-66577MEDIUM5.3
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoDec 05, 2025
CVE-2025-66549LOW2.4
  • Linux DebianLinux Debian
  • nextcloud-desktop
NoYesDec 05, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management