Cyber Posture

CVE-2025-52638

Medium

Published: 16 March 2026

Published
16 March 2026
Modified
27 March 2026
KEV Added
Patch
CVSS Score 5.6 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.0002 5.0th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-52638 is a medium-severity Insufficient Verification of Data Authenticity (CWE-345) vulnerability in Hcl Aion. Its CVSS base score is 5.6 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Escape to Host (T1611); ranked at the 5.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Escape to Host (T1611).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-345

Directly requires independent verification of matching output before adverse decisions, mitigating insufficient authenticity checks on data from external sources.

addresses: CWE-345

Use of approved PKI certificates provides verifiable data authenticity and origin for communications and artifacts.

addresses: CWE-345

Mandates provision of authenticity and integrity artifacts that enable verification of name/address resolution data.

addresses: CWE-345

Requires explicit verification of data authenticity from authoritative sources, preventing acceptance of unauthenticated resolution responses.

addresses: CWE-345

Control requires verification of data authenticity/integrity (e.g., checksums) after aggregation/packing, directly reducing exploitation of insufficient verification before transmission.

addresses: CWE-345

Time synchronization supports reliable freshness verification when checking data authenticity across systems or components.

addresses: CWE-345

Mandates verification of data authenticity for software, firmware, and information.

addresses: CWE-345

Provenance documentation and monitoring directly enables verification of authenticity for components and data throughout their history.

MITRE ATT&CK Enterprise TechniquesAI

T1611 Escape to Host Privilege Escalation
Adversaries may break out of a container or virtualized environment to gain access to the underlying host.
Why these techniques?

Root execution in generated containers directly facilitates container-to-host escape attempts.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

HCL AION is affected by a vulnerability where generated containers may execute binaries with root-level privileges. Running containers with root privileges may increase the potential security risk, as it grants elevated permissions within the container environment. Aligning container configurations with…

more

security best practices requires minimizing privileges and avoiding root-level execution wherever possible.

Deeper analysisAI

CVE-2025-52638 is a vulnerability in HCL AION that allows generated containers to execute binaries with root-level privileges. This issue increases security risks by granting elevated permissions within the container environment, contrary to best practices that emphasize privilege minimization. The vulnerability is rated with a CVSS v3.1 base score of 5.6 (AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H) and is associated with CWE-345 (Insufficient Verification of Data Authenticity).

Exploitation requires local access to the system, high attack complexity, privileges at a high level, and user interaction from the target. An attacker who meets these conditions can achieve high impacts on integrity and availability, enabling unauthorized modifications and disruptions to container processes, though confidentiality remains unaffected.

The HCL support knowledge base article at https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129410 details the issue and mitigation steps, which include aligning container configurations with security best practices such as minimizing privileges and avoiding root-level execution wherever possible.

Details

CWE(s)

Affected Products

hcl
aion
2.0 — 2.1.2

CVEs Like This One

CVE-2025-52648Same product: Hcl Aion
CVE-2025-52637Same product: Hcl Aion
CVE-2025-27680Shared CWE-345
CVE-2026-24775Shared CWE-345
CVE-2025-63910Shared CWE-345
CVE-2026-24772Shared CWE-345
CVE-2024-39805Shared CWE-345
CVE-2026-25921Shared CWE-345
CVE-2026-43534Shared CWE-345
CVE-2026-23966Shared CWE-345

References