Article Details

Scrape Timestamp (UTC): 2024-05-30 17:50:37.145

Source: https://thehackernews.com/2024/05/cisa-alerts-federal-agencies-to-patch.html

Original Article Text

Click to Toggle View

CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2024-1086 (CVSS score: 7.8), the high-severity issue relates to a use-after-free bug in the netfilter component that permits a local attacker to elevate privileges from a regular user to root and possibly execute arbitrary code. "Linux kernel contains a use-after-free vulnerability in the netfilter: nf_tables component that allows an attacker to achieve local privilege escalation," CISA said. Netfilter is a framework provided by the Linux kernel that allows the implementation of various network-related operations in the form of custom handlers to facilitate packet filtering, network address translation, and port translation. The vulnerability was addressed in January 2024. That said, the exact nature of the attacks exploiting the flaw is presently unknown. Also added to the KEV catalog is a newly disclosed security flaw impacting Check Point network gateway security products (CVE-2024-24919, CVSS score: 7.5) that allows an attacker to read sensitive information on Internet-connected Gateways with remote access VPN or mobile access enabled. In light of the active exploitation of CVE-2024-1086 and CVE-2024-24919, federal agencies are recommended to apply the latest fixes by June 20, 2024, to protect their networks against potential threats.

Daily Brief Summary

NATION STATE ACTIVITY // CISA Urges Patch of Actively Exploited Linux Kernel Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has observed active exploitation of a critical flaw in the Linux kernel, coded CVE-2024-1086.

This high-severity vulnerability in the netfilter component allows attackers to escalate privileges from regular user to root, enhancing their capability to execute arbitrary code.

The vulnerability, specifically a use-after-free bug, was reportedly patched in January 2024.

Additionally, a new vulnerability in Check Point network gateway security products (CVE-2024-24919) has been identified and added to the KEV catalog, which also poses significant risks.

Federal agencies have been directed to implement the latest security patches by June 20, 2024, to mitigate against these and other potential threats.

Details regarding the nature of the attacks exploiting the Linux kernel flaw remain unspecified at this time.