CVE-2025-53391

Publication date 30 June 2025

Last updated 30 June 2025


Ubuntu priority

Cvss 3 Severity Score

9.3 · Critical

Score breakdown

The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings that allow a local user to escalate their privileges to root.

Why is this CVE high priority?

Upstream rates this as being high severity

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
zulucrypt 25.04 plucky
Needs evaluation
24.10 oracular
Needs evaluation
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Severity score breakdown

Parameter Value
Base score 9.3 · Critical
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Changed
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H