Heimdal
article featured image

Contents:

Unprivileged threat actors can obtain root privileges by exploiting a Local Privilege Escalation (LPE) flaw in default configurations of the Linux Kernel’s filesystem layer on exposed devices.

Cybersecurity specialists at Qualys found that the LPE security bug tracked as CVE-2021-33909 aka Sequoia is present in the filesystem layer utilized to manage user data, a feature universally used by all important (Linux) operating systems.

According to the study, the flaw affects all Linux kernel versions released since 2014.

Once successfully exploited on a vulnerable system, the cybercriminals acquire full root privileges on default installations of multiple modern distributions.

We successfully exploited this uncontrolled out-of-bounds write, and obtained full root privileges on default installations of Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04, Debian 11, and Fedora 34 Workstation; other Linux distributions are certainly vulnerable, and probably exploitable.

Source

Linux users are advised to apply patches released yesterday as the attack surface exposed by the LPE security bug reaches over a wide range of distros and releases.

The Qualys researchers have also stumbled upon a stack exhaustion denial-of-service vulnerability, tracked as CVE-2021-33910, that affects the systemd utility.

systemd is a software suite that provides an array of system components for Linux operating systems. Its main aim is to unify service configuration and behavior across Linux distributions; systemd’s primary component is a “system and service manager”—an init system used to bootstrap user space and manage user processes.

This security vulnerability was introduced in April 2015 and is present in all systemd versions released since then, except for those published yesterday to patch the flaw, BleepingComputer reported.

The cloud security company also created and attached proof-of-concept exploits to the two blog posts, PoC exploits meant to show how possible cybercriminals could successfully take advantage of these two vulnerabilities.

Author Profile

Antonia Din

PR & Video Content Manager

linkedin icon

As a Senior Content Writer and Video Content Creator specializing in cybersecurity, I leverage digital media to unravel and clarify complex cybersecurity concepts and emerging trends. With my extensive knowledge in the field, I create content that engages a diverse audience, from cybersecurity novices to experienced experts. My approach is to create a nexus of understanding, taking technical security topics and transforming them into accessible, relatable knowledge for anyone interested in strengthening their security posture.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE