Summary : A local privilege escalation vulnerability poc has been released, tracked as CVE-2025-6019, discovered in the udisksd daemon and its backend libblockdev library, affecting widely used Linux distributions including Fedora and SUSE.
| Severity | High |
| CVSS Score | 7.0 |
| CVEs | CVE-2025-6019 |
| POC Available | Yes |
| Actively Exploited | No |
| Exploited in Wild | No |
| Advisory Version | 1.0 |
Overview
CVE-2025-6019 is a local privilege escalation (LPE) vulnerability affecting systems where:
This flaw allows unprivileged users in the “allow_active” group to escalate privileges and execute commands as root by exploiting insecure trust boundaries in D-Bus IPC communication.
| Vulnerability Name | CVE ID | Product Affected | Severity |
| Local Privilege Escalation Vulnerability | CVE-2025-6019 | udisksd / libblockdev | High |
Technical Summary
This vulnerability is triggered when an attacker in the “allow_active” group issues a crafted D-Bus request to the udisksd daemon using tools like udisksctl. Because the daemon improperly relies on group membership alone (without UID validation), it mistakenly grants root-level mount permissions.
An attacker can exploit this by
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2025-6019 | Fedora, SUSE, and other Linux distros using udisks2/libblockdev | Improper user validation in D-Bus authorization allows unprivileged users to perform privileged disk operations. | Local privilege escalation to root |
Remediation:
Here are the recommendations below
Conclusion:
CVE-2025-6019 highlights a breakdown in privilege boundary enforcement within a core system component used by many Linux desktop environments.
The availability of a public PoC, combined with the low complexity of exploitation, makes this vulnerability highly dangerous, particularly in multi-user or shared computing environments.
Organizations must act swiftly to patch vulnerable systems, reassess group-based privilege models and implement stricter D-Bus and Polkit rules to reduce attack surface.
References:
Recent Comments