Search for vulnerabilities
Vulnerability details: VCID-wn1u-kwyb-akdq
Vulnerability ID VCID-wn1u-kwyb-akdq
Aliases CVE-2019-12499
Summary Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (with the exploit code inside) needs to be started as root, and it also needs to be terminated as root from the host (either by stopping it ungracefully (e.g., SIGKILL), or by using the --shutdown control command). This is similar to CVE-2019-5736.
Status Published
Exploitability 0.5
Weighted Severity 8.4
Risk 4.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
epss 0.01367 https://api.first.org/data/v1/epss?cve=CVE-2019-12499
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2019-12499
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2019-12499
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2019-12499
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-12499
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.79394
EPSS Score 0.01367
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T12:06:34.277060+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 37.0.0