High-Severity Vulnerability in Linux UDisks Daemon (CVE-2025-8067)
September 2nd, 2025
High

Our Cyber Threat Intelligence Unit has identified a high-severity vulnerability in the Linux UDisks2 daemon (udisksd), tracked as CVE-2025-8067, having a CVSS v3.1 base score of 8.5 (High). This vulnerability exists in the loop-device handling code, where improper input validation of the index parameter allows crafted D-Bus requests to trigger an out-of-bounds read. An unprivileged local attacker can exploit this issue to crash the daemon (denial of service) or escalate privileges by mapping internal file descriptors to loop devices to enable access to files owned by privileged users. Because UDisks is widely deployed across major Linux distributions, this vulnerability poses a significant risk to system stability and security.
Technical Details
Attack Type: Local Privilege Escalation / Denial of Service.
Severity: High (CVSS 8.5)
Delivery Method: Crafted D-Bus messages sent to the UDisks daemon by an unprivileged local user.
Technique: Out-of-Bounds Read from missing lower-bound validation of the index parameter (CWE-125).
CVE ID: CVE-2025-8067
Affected Products:
Linux systems running UDisks2 earlier than 2.10.2 (stable) or 2.10.91 (development).
Note: Some vendor distributions ship backported fixes under older package versions (e.g., RHEL 8’s udisks2-2.9.0-16). Always verify against vendor advisories rather than relying solely on upstream version numbers.
This vulnerability arises when a negative index value is passed to loop-device handling functions, allowing unauthorized file mappings or daemon crashes.

Impact
Privilege Escalation: Local attackers may access privileged files by mapping them to loop devices.
Denial of Service: Crafted requests can crash the UDisks daemon, disrupting storage management services.
System Security Degradation: Exploited hosts may facilitate persistence, lateral movement, or further compromise.
Enterprise Risk: Given UDisks’ role in storage device management, exploitation poses a high risk to both workstation and server environments.
Detection Method
Verify UDisks2 package versions; systems running builds earlier than 2.10.2/2.10.91 may be vulnerable unless vendor advisories confirm backported fixes.
Monitor journalctl or /var/log/syslog for repeated daemon crashes.
Audit D-Bus activity for anomalous loop-device requests.
Update and run vulnerability scanners (e.g., Nessus, Qualys, OpenVAS) with CVE-2025-8067 signatures.
Centralize logs to detect privilege escalation attempts linked to udisksd processes.
Indicators of Compromise
There are no Indicators Of Compromise (IOCs) for this Advisory.

Recommendations
Apply Vendor Patches: Upgrade to UDisks2 2.10.2 or 2.10.91, or apply the latest vendor-provided updates.
Follow Distro Advisories: Consult Red Hat, SUSE, Ubuntu, Debian, and Fedora advisories for patched builds.
Restrict Local Access: Limit unprivileged shell access on servers and workstations running UDisks.
Harden D-Bus Policies: Reduce exposure of sensitive services to unprivileged users.
Enforce Least Privilege: Apply strict privilege separation to mitigate local exploitation attempts.
Monitoring: Deploy continuous monitoring for privilege escalation anomalies or abnormal crashes in udisksd.
No vendor workarounds have been published; patching is the only remediation.
Conclusion
The discovery of CVE-2025-8067 highlights the systemic risks caused by vulnerabilities in widely used Linux daemons. With the potential for privilege escalation and service disruption, promptly enacting system patches and vigilantly monitoring your IT infrastructure are crucial. We urge organizations to prioritize immediate remediation to safeguard operational stability and reduce exposure to local threats.