CVE-2025-50691

MCSManager 10.5.3 daemon process runs as a root account by default, and its sensitive data (including tokens and terminal content) is stored in the data directory, readable by all users. Other users on the system can read the daemon's key and use it to log in, leading to privilege escalation.
Configurations

No configuration.

History

22 Aug 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-266

22 Aug 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 14:15

Updated : 2025-08-22 18:15


NVD link : CVE-2025-50691

Mitre link : CVE-2025-50691

CVE.ORG link : CVE-2025-50691


JSON object : View

Products Affected

No product.

CWE
CWE-266

Incorrect Privilege Assignment