CVE-2025-59054

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59054
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59054.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59054
Aliases
  • GHSA-jxq2-hpw3-m5wf
Published
2025-09-12T13:01:02Z
Modified
2025-11-11T19:39:15.546965Z
Severity
  • 8.5 (High) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
dstack has insecure LUKS2 persistent storage partitions that may be opened and used
Details

dstack is a software development kit (SDK) to simplify the deployment of arbitrary containerized apps into trusted execution environments. In versions of dstack prior to 0.5.4, a malicious host may provide a crafted LUKS2 data volume to a dstack CVM for use as the /data mount. The guest will open the volume and write secret data using a volume key known to the attacker, causing disclosure of Wireguard keys and other secret information. The attacker can also pre-load data on the device, which could potentially compromise guest execution. LUKS2 volume metadata is not authenticated and supports null key-encryption algorithms, allowing an attacker to create a volume such that the volume opens (cryptsetup open) without error using any passphrase or token, records all writes in plaintext (or ciphertext with an attacker-known key), and/or contains arbitrary data chosen by the attacker. Version 0.5.4 of dstack contains a patch that addresses LUKS headers.

Database specific
{
    "cwe_ids": [
        "CWE-552"
    ]
}
References

Affected packages

Git / github.com/dstack-tee/dstack

Affected ranges

Type
GIT
Repo
https://github.com/dstack-tee/dstack
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

dev-v0.*

dev-v0.4.0.0

gateway-v0.*

gateway-v0.5.3

kms-v0.*

kms-v0.5.3
kms-v0.5.4

v0.*

v0.3.1
v0.3.2
v0.3.3
v0.3.4
v0.3.4-beta
v0.4.2
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.4