A container privilege escalation flaw was found in certain Ansible Automation Platform images. This issue arises from the /etc/passwd file being created with group-writable permissions during the build process. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This vulnerability allows an attacker to add a new user with any arbitrary UID, including UID 0, gaining full root privileges within the container.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat ansible automation platform | — |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| red hat | red hat process automation | cert_advisory | 90% |
| red hat | enterprise linux | cert_advisory | 90% |
| red hat | openshift | cert_advisory | 90% |
| red hat | red hat ansible automation | cert_advisory | 90% |
Updated severity to CRITICAL and added CVE-2025-57847 as a new tag.
Initial creation