Vulnerability Description
In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Multipass | < 1.16.0 |
| Apple | Macos | - |
Related Weaknesses (CWE)
References
- https://github.com/canonical/multipass/pull/4115Issue TrackingPatch
- https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3ExploitPatchVendor Advisory
- https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3ExploitPatchVendor Advisory
FAQ
What is CVE-2025-5199?
CVE-2025-5199 is a vulnerability with a CVSS score of 7.3 (HIGH). In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileg...
How severe is CVE-2025-5199?
CVE-2025-5199 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-5199?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Multipass, Apple Macos.