{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T16:25:40.201","vulnerabilities":[{"cve":{"id":"CVE-2025-5199","sourceIdentifier":"security@ubuntu.com","published":"2025-07-12T00:15:23.460","lastModified":"2025-08-26T18:37:22.187","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup."},{"lang":"es","value":"En Canonical Multipass hasta la versión 1.15.1 incluida en macOS, los permisos predeterminados incorrectos permiten que un atacante local aumente los privilegios modificando archivos ejecutados con privilegios administrativos por un Launch Daemon durante el inicio del sistema."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:multipass:*:-:*:*:*:*:*:*","versionEndExcluding":"1.16.0","matchCriteriaId":"9686E3D5-2990-4588-827F-95994C955DFD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"}]}]}],"references":[{"url":"https://github.com/canonical/multipass/pull/4115","source":"security@ubuntu.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3","source":"security@ubuntu.com","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Patch","Vendor Advisory"]}]}}]}