{
  "threat_severity" : "Moderate",
  "public_date" : "2026-03-04T15:06:00Z",
  "bugzilla" : {
    "description" : "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
    "id" : "2413081",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-279",
  "details" : [ "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.", "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client." ],
  "statement" : "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
  "acknowledgement" : "Red Hat would like to thank Simon Hall for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-03-06T00:00:00Z",
    "advisory" : "RHSA-2026:3939",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "nfs-utils-1:2.8.3-0.el10_1.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-03-05T00:00:00Z",
    "advisory" : "RHSA-2026:3938",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "nfs-utils-1:2.3.3-68.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-03-05T00:00:00Z",
    "advisory" : "RHSA-2026:3940",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "nfs-utils-1:2.5.4-38.el9_7.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-03-05T00:00:00Z",
    "advisory" : "RHSA-2026:3940",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "nfs-utils-1:2.5.4-38.el9_7.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-03-06T00:00:00Z",
    "advisory" : "RHSA-2026:3942",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "nfs-utils-1:2.5.4-26.el9_4.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-03-06T00:00:00Z",
    "advisory" : "RHSA-2026:3941",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "nfs-utils-1:2.5.4-34.el9_6.3"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.16",
    "release_date" : "2026-04-02T00:00:00Z",
    "advisory" : "RHSA-2026:5873",
    "cpe" : "cpe:/a:redhat:openshift:4.16::el9",
    "package" : "rhcos-416.94.202603231244-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.17",
    "release_date" : "2026-04-01T00:00:00Z",
    "advisory" : "RHSA-2026:5867",
    "cpe" : "cpe:/a:redhat:openshift:4.17::el9",
    "package" : "rhcos-417.94.202603242359-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.18",
    "release_date" : "2026-03-25T00:00:00Z",
    "advisory" : "RHSA-2026:5127",
    "cpe" : "cpe:/a:redhat:openshift:4.18::el9",
    "package" : "rhcos-418.94.202603181125-0"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.19",
    "release_date" : "2026-04-01T00:00:00Z",
    "advisory" : "RHSA-2026:5877",
    "cpe" : "cpe:/a:redhat:openshift:4.19::el9",
    "package" : "rhcos-4.19.9.6.202603251941-0"
  }, {
    "product_name" : "Red Hat Ceph Storage 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5606",
    "cpe" : "cpe:/a:redhat:ceph_storage:8::el9",
    "package" : "rhceph/rhceph-8-rhel9:sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "nfs-utils",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "nfs-utils-lib",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "nfs-utils",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-12801\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-12801" ],
  "name" : "CVE-2025-12801",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}