NewStart CGSL MAIN 7.02 : systemd Vulnerability (NS-SA-2026-0034)

medium Nessus Plugin ID 304044

Synopsis

The remote NewStart CGSL host is affected by a vulnerability.

Description

The remote NewStart CGSL host, running version MAIN 7.02, has systemd packages installed that are affected by a vulnerability:

- The systemd-coredump is prone to a kill-and-replace race condition which may allow a local attacker to gain sensitive information from crashed SUID processes. Additionally systemd-coredump does not specify %d (the kernel's per-process dumpable flag) in /proc/sys/kernel/core_pattern allowing a local attacker to crash root daemons that fork() and setuid() to the attacker's uid and consequently gain read access to the resulting core dumps and therefore to sensitive information from memory of the root daemons.
(CVE-2025-4598)

- A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd- coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality. (CVE-2025-4598)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL systemd packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2026-0034

https://security.gd-linux.com/info/CVE-2025-4598

Plugin Details

Severity: Medium

ID: 304044

File Name: newstart_cgsl_NS-SA-2026-0034_systemd.nasl

Version: 1.1

Type: local

Published: 3/28/2026

Updated: 3/28/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 3.2

Temporal Score: 2.5

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:N/A:P

CVSS Score Source: CVE-2025-4598

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.2

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 4.8

Threat Score: 1.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:systemd, p-cpe:/a:zte:cgsl_main:systemd-devel, p-cpe:/a:zte:cgsl_main:systemd-libs, p-cpe:/a:zte:cgsl_main:systemd-resolved, p-cpe:/a:zte:cgsl_main:systemd-container, p-cpe:/a:zte:cgsl_main:systemd-journal-remote, p-cpe:/a:zte:cgsl_main:systemd-pam, p-cpe:/a:zte:cgsl_main:systemd-tests, p-cpe:/a:zte:cgsl_main:systemd-udev, cpe:/o:zte:cgsl_main:7, p-cpe:/a:zte:cgsl_main:systemd-rpm-macros, p-cpe:/a:zte:cgsl_main:systemd-battery-check, p-cpe:/a:zte:cgsl_main:systemd-boot-unsigned, p-cpe:/a:zte:cgsl_main:systemd-bsod, p-cpe:/a:zte:cgsl_main:systemd-doc, p-cpe:/a:zte:cgsl_main:systemd-libs-core, p-cpe:/a:zte:cgsl_main:systemd-oomd-defaults, p-cpe:/a:zte:cgsl_main:systemd-pcrlock, p-cpe:/a:zte:cgsl_main:systemd-standalone-repart, p-cpe:/a:zte:cgsl_main:systemd-standalone-shutdown, p-cpe:/a:zte:cgsl_main:systemd-standalone-sysusers, p-cpe:/a:zte:cgsl_main:systemd-standalone-tmpfiles, p-cpe:/a:zte:cgsl_main:systemd-storagetm

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/27/2026

Vulnerability Publication Date: 5/29/2025

Reference Information

CVE: CVE-2025-4598