Cyber Posture

CVE-2025-26599

High

Published: 25 February 2025

Published
25 February 2025
Modified
06 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Security Summary

CVE-2025-26599 is an access to an uninitialized pointer flaw (CWE-824) affecting X.Org and Xwayland. The vulnerability arises when the function compCheckRedirect() fails to allocate the backing pixmap, causing compRedirectWindow() to return a BadAlloc error without fully validating the previously marked window tree. This leaves the validated data partly uninitialized, resulting in the subsequent use of an uninitialized pointer. The issue was published on 2025-02-25 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation grants high-impact access to confidential data, modification of system integrity, and disruption of availability, potentially leading to full system compromise on affected X.Org or Xwayland installations.

Red Hat has released multiple errata addressing the flaw, including RHSA-2025:2500, RHSA-2025:2502, RHSA-2025:2861, RHSA-2025:2862, and RHSA-2025:2865, which provide updated packages with fixes for vulnerable systems.

Details

CWE(s)
CWE-824

Affected Products

tigervnc
tigervnc
all versions
x.org
x server
≤ 21.1.16
x.org
xwayland
≤ 24.1.6
redhat
enterprise linux
7.0, 8.0, 9.0

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

CVE-2025-26599 is a memory corruption vulnerability (uninitialized pointer) in Xwayland/X.Org components integrated in TigerVNC server, enabling remote code execution or denial of service via malformed X11 protocol requests over VNC remote service.

References