{
  "threat_severity" : "Moderate",
  "public_date" : "2025-06-26T00:00:00Z",
  "bugzilla" : {
    "description" : "ceph: privilege escalation by unprivileged users in a ceph-fuse mounted CephFS",
    "id" : "2374412",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2374412"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-272",
  "details" : [ "Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.", "A vulnerability in Ceph was discovered whereby an unprivileged user could change the permissions of a directory owned by the root user, gaining access to the targeted directory. The non-privileged user can escalate privileges to root in a CephFS mounted with ceph-fuse by applying chmod 777 (read, write, and execute for all users) to any directory owned by root. This allows the user to read, write, and execute to that directory even if they were not the original owner. The vulnerability could potentially allow a user to gain unauthorized access or modify critical system data." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 7.1",
    "release_date" : "2026-02-17T00:00:00Z",
    "advisory" : "RHSA-2026:2769",
    "cpe" : "cpe:/a:redhat:ceph_storage:7.1::el8",
    "package" : "ceph-2:18.2.1-381.el8cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 9.0",
    "release_date" : "2026-01-29T00:00:00Z",
    "advisory" : "RHSA-2026:1536",
    "cpe" : "cpe:/a:redhat:ceph_storage:9.0::el9",
    "package" : "ceph-2:20.1.0-144.el10cp"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 4",
    "fix_state" : "Affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:4"
  }, {
    "product_name" : "Red Hat Ceph Storage 5",
    "fix_state" : "Out of support scope",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:5"
  }, {
    "product_name" : "Red Hat Ceph Storage 6",
    "fix_state" : "Will not fix",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:6"
  }, {
    "product_name" : "Red Hat Ceph Storage 8",
    "fix_state" : "Affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-52555\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-52555\nhttps://github.com/ceph/ceph/pull/60314\nhttps://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm" ],
  "name" : "CVE-2025-52555",
  "mitigation" : {
    "value" : "Red Hat Product Security does not have any recommended mitigations at this time. Please update as patched versions become available.",
    "lang" : "en:us"
  },
  "csaw" : false
}