CVE-2025-54767

An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*

History

09 Oct 2025, 17:43

Type Values Removed Values Added
CPE cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:*
First Time Xorux lpar2rrd
Xorux
References () https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt - () https://korelogic.com/Resources/Advisories/KL-001-2025-014.txt - Exploit, Third Party Advisory
References () https://lpar2rrd.com/note800.php - () https://lpar2rrd.com/note800.php - Release Notes

29 Jul 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
Summary
  • (es) Un usuario autenticado de solo lectura puede matar cualquier proceso que se ejecute en el dispositivo virtual Xormon Original como usuario lpar2rrd.

29 Jul 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-29 00:15

Updated : 2025-10-09 17:43


NVD link : CVE-2025-54767

Mitre link : CVE-2025-54767

CVE.ORG link : CVE-2025-54767


JSON object : View

Products Affected

xorux

  • lpar2rrd
CWE
CWE-648

Incorrect Use of Privileged APIs