CVE-2025-6019

HIGH EXPLOITED

libblockdev - Privilege Escalation

Title source: llm

Description

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Exploits (23)

nomisec WORKING POC 65 stars
by guinea-offensive-security · local
https://github.com/guinea-offensive-security/CVE-2025-6019
github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-6019
github WORKING POC 9 stars
by MichaelVenturella · shelllocal
https://github.com/MichaelVenturella/CVE-2025-6018-6019-PoC
github WORKING POC 9 stars
by muyuanlove · shellpoc
https://github.com/muyuanlove/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit
github WORKING POC 6 stars
by dreysanox · pythonremote-auth
https://github.com/dreysanox/CVE-2025-6018_Poc
nomisec WORKING POC 4 stars
by And-oss · local
https://github.com/And-oss/CVE-2025-6019-exploit
github WORKING POC 3 stars
by 0rionCollector · shelllocal
https://github.com/0rionCollector/Exploit-Chain-CVE-2025-6018-6019
nomisec WORKING POC 3 stars
by neko205-mx · local
https://github.com/neko205-mx/CVE-2025-6019_Exploit
nomisec WORKING POC 1 stars
by JM00NJ · local
https://github.com/JM00NJ/CVE-2025-6019-udisks2-XFS-Resize-TOCTOU-Privilege-Escalation
github WORKING POC 1 stars
by localh0ste · poc
https://github.com/localh0ste/CVE-2025-6018-and-CVE-2025-6019
github WORKING POC 1 stars
by DesertDemons · shellpoc
https://github.com/DesertDemons/CVE-2025-6018-6019
nomisec WORKING POC 1 stars
by boboaung1337 · local
https://github.com/boboaung1337/CVE-2025-6019
github WORKING POC 1 stars
by Goultarde · shellremote-auth
https://github.com/Goultarde/CVE-2025-6018_CVE-2025-6019_autopwn
github SUSPICIOUS 1 stars
by AzureADTrent · poc
https://github.com/AzureADTrent/CVE-2025-6018-and-CVE-2025-6019-Privilege-Escalation
github WORKING POC
by MaxKappa · shelllocal
https://github.com/MaxKappa/opensuse-leap-privesc-exploit
nomisec WORKING POC
by HexRazor · local
https://github.com/HexRazor/CVE-2025-6019
github WORKING POC
by matesz44 · shelllocal
https://github.com/matesz44/CVE-2025-6018-19
nomisec WORKING POC
by symphony2colour · local
https://github.com/symphony2colour/CVE-2025-6019-udisks-lpe-no-image
nomisec WORKING POC
by 0x5chltz · local
https://github.com/0x5chltz/CVE-2025-6019
nomisec WORKING POC
by phamdinhquy2512 · local
https://github.com/phamdinhquy2512/CVE-2025-6019-Exploitation
nomisec WRITEUP
by robbin0919 · local
https://github.com/robbin0919/CVE-2025-6019
nomisec WORKING POC
by harshitvarma05 · local
https://github.com/harshitvarma05/CVE-2025-6019
vulncheck_xdb WORKING POC
local
https://github.com/iOxsec/CVE-2025-6018-CVE-2025-6019-Privilege-Escalation-Exploit

Scores

CVSS v3 7.0
EPSS 0.0003
EPSS Percentile 8.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-10-09
CWE
CWE-250
Status published
Products (13)
Red Hat/Red Hat Enterprise Linux 10 0:3.2.0-4.el10_0
Red Hat/Red Hat Enterprise Linux 7 Extended Lifecycle Support 0:2.18-5.el7_9.1
Red Hat/Red Hat Enterprise Linux 8 0:2.28-7.el8_10
Red Hat/Red Hat Enterprise Linux 8.2 Advanced Update Support 0:2.19-13.el8_2
Red Hat/Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:2.24-6.el8_4
Red Hat/Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:2.24-9.el8_6
Red Hat/Red Hat Enterprise Linux 8.6 Telecommunications Update Service 0:2.24-9.el8_6
Red Hat/Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions 0:2.24-9.el8_6
Red Hat/Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions 0:2.28-3.el8_8
Red Hat/Red Hat Enterprise Linux 9 0:2.28-14.el9_6
... and 3 more
Published Jun 19, 2025
Tracked Since Feb 18, 2026