A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.cvcn.gov.it/cvcn/cve/CVE-2025-27027 |
|
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 09 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Jul 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-653 |
Wed, 09 Jul 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-653 |
Wed, 09 Jul 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Restricted shell rbash evasion in Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) allows the user vpuser to start a full-feature shell. A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions. | A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions. |
| Title | Restricted shell rbash evasion in Radiflow iSAP Smart Collector | Restricted shell evasion in Radiflow iSAP Smart Collector |
| Weaknesses | CWE-653 |
Wed, 09 Jul 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Restricted shell rbash evasion in Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) allows the user vpuser to start a full-feature shell. A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions. | |
| Title | Restricted shell rbash evasion in Radiflow iSAP Smart Collector | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ENISA
Published: 2025-07-09T08:31:29.320Z
Updated: 2025-07-09T13:34:00.352Z
Reserved: 2025-02-18T06:59:55.889Z
Link: CVE-2025-27027
Updated: 2025-07-09T13:32:58.912Z
Status : Awaiting Analysis
Published: 2025-07-09T09:15:26.720
Modified: 2025-07-10T13:17:30.017
Link: CVE-2025-27027
No data.