Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.4
Multicluster Engine for Kubernetes: Unauthorized Access to Root Privileges
CVE-2025-57851
Summary
Certain Multicluster Engine for Kubernetes images have a security issue that allows an attacker to gain full control of a container. This occurs when an attacker can modify the /etc/passwd file, which is used to manage user accounts. To fix this, update your containers to use the latest, patched version of the Multicluster Engine for Kubernetes.
Original title
A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes images. This issue stems from the /etc/passwd file being created with group-writable permissions during...
Original description
A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
nvd CVSS3.1
6.4
Vulnerability type
CWE-276
Incorrect Default Permissions
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 8 Apr 2026