CVE-2025-68973

GnuPG · GnuPG Multiple Products

A high-severity vulnerability has been discovered in multiple GnuPG products, a widely used encryption software suite.

Executive summary

A high-severity vulnerability has been discovered in multiple GnuPG products, a widely used encryption software suite. This flaw could allow a local attacker with basic user access to escalate their privileges and execute arbitrary code, potentially leading to a full compromise of the affected system. Organizations should prioritize applying the vendor-supplied security updates to mitigate the risk of unauthorized system access and data compromise.

Vulnerability

This vulnerability is a heap-based buffer overflow within the gpg-agent, a core component of GnuPG that manages private keys. The flaw can be triggered when the agent processes a specially crafted request from a local user through its Unix domain socket. An authenticated but unprivileged local attacker can send a malformed request that overflows a buffer during parsing, leading to a controllable memory corruption state. A successful exploit could allow the attacker to execute arbitrary code with the permissions of the gpg-agent process, which can lead to privilege escalation on the host system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could lead to a complete compromise of the host system's confidentiality, integrity, and availability. Since GnuPG is a foundational tool for data encryption and digital signatures, an attacker gaining control of the system could bypass these security measures, access sensitive encrypted data, tamper with critical system files, or install persistent malware. This poses a significant risk to multi-user systems, such as shared development servers or production environments, where a low-privileged user or compromised service account could escalate their access to take full control of the machine.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the GnuPG project and respective downstream distribution vendors immediately. After patching, it is crucial to monitor systems for any signs of attempted exploitation by reviewing system and application logs for unusual activity or crashes related to GnuPG processes.

Proactive Monitoring: Organizations should monitor for anomalous behavior related to GnuPG components. This includes looking for unexpected crashes or error messages from gpg-agent in system logs (e.g., journalctl, /var/log/syslog). Additionally, security teams should use system auditing tools (e.g., auditd) to monitor for unexpected process execution originating from GnuPG daemons or unauthorized attempts to access sensitive key material.

Compensating Controls: If immediate patching is not feasible, organizations can implement compensating controls to reduce the risk. This includes restricting shell access for untrusted users on shared systems, applying strict application control policies (e.g., SELinux, AppArmor) to confine GnuPG processes, and using containerization or sandboxing to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high severity (CVSS 7.8) and the critical role GnuPG plays in securing data and system communications, organizations are strongly advised to prioritize the deployment of vendor-supplied patches across all affected systems. This vulnerability represents a direct path for privilege escalation on any system where an attacker can gain initial low-privileged access. While this vulnerability is not currently listed on the CISA KEV catalog, its potential impact warrants immediate attention. Systems that cannot be patched immediately should have compensating controls applied and be placed under enhanced monitoring for suspicious local activity.