Cyber Posture

CVE-2025-15480

Critical

Published: 09 April 2026

Published
09 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0005 16.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15480 is a critical-severity Exposure of Sensitive System Information Due to Uncleared Debug Information (CWE-1258) vulnerability in Canonical Ubuntu Desktop Provision. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Credentials In Files (T1552.001); ranked at the 16.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Credentials In Files (T1552.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely flaw remediation through patching ubuntu-desktop-provision to eliminate password hash leakage in crash logs.

detect

Monitors systems specifically for unauthorized disclosure of sensitive information like password hashes in crash reports submitted to Launchpad.

prevent

Filters sensitive credentials such as password hashes from information output before transmission to external services like Launchpad bug reporting.

MITRE ATT&CK Enterprise TechniquesAI

T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Direct exposure of password hashes in crash log files uploaded to Launchpad enables credential access via unsecured files.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In Ubuntu, ubuntu-desktop-provision version 24.04.4 could leak sensitive user credentials during crash reporting. Upon installation failure, if a user submitted a bug report to Launchpad, ubuntu-desktop-provision could include the user's password hash in the attached logs.

Deeper analysisAI

CVE-2025-15480 is a vulnerability in Ubuntu's ubuntu-desktop-provision version 24.04.4 that leads to the leakage of sensitive user credentials during crash reporting. Upon installation failure, if a user submits a bug report to Launchpad, the tool could include the user's password hash in the attached logs. This issue is categorized under CWE-1258 and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), indicating critical severity due to high confidentiality and availability impacts.

The vulnerability can be exploited by any unauthenticated attacker with network access to Launchpad, requiring low attack complexity and no privileges or direct user interaction from the attacker's perspective. Exploitation relies on a victim encountering an installation failure and choosing to submit a bug report, after which the password hash becomes accessible in the logs. Successful exploitation allows attackers to obtain the victim's password hash, enabling potential further credential compromise.

Mitigation is addressed in the canonical/ubuntu-desktop-provision GitHub repository through pull requests #1399 and #1400, which resolve the credential leakage in crash logs. Security practitioners should ensure affected systems are updated to patched versions of ubuntu-desktop-provision.

Details

CWE(s)

Affected Products

canonical
ubuntu desktop provision
24.04.4

CVEs Like This One

CVE-2025-14551Same vendor: Canonical
CVE-2026-34179Same vendor: Canonical
CVE-2026-34177Same vendor: Canonical
CVE-2025-53513Same vendor: Canonical
CVE-2026-5412Same vendor: Canonical
CVE-2026-32692Same vendor: Canonical
CVE-2025-0928Same vendor: Canonical
CVE-2026-32693Same vendor: Canonical
CVE-2026-4370Same vendor: Canonical
CVE-2026-34178Same vendor: Canonical

References