profile in use as well as the daemon’s log settings.This issue affects TLP: from 1.9 before 1.9.1.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 15 Jan 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linrunner
Linrunner tlp |
|
| Vendors & Products |
Linrunner
Linrunner tlp |
Wed, 14 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Improper Authentication vulnerability in TLP allows local users to arbitrarily control the power profile in use as well as the daemon’s log settings.This issue affects TLP: from 1.9 before 1.9.1. | |
| Title | Polkit Authorization Check can be Bypassed in the TLP power daemon | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2026-01-14T16:08:41.480Z
Reserved: 2025-12-12T14:23:59.780Z
Link: CVE-2025-67859
Updated: 2026-01-14T16:07:43.673Z
Status : Deferred
Published: 2026-01-14T12:16:32.367
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-67859
No data.
OpenCVE Enrichment
Updated: 2026-01-15T08:04:02Z