Original Article Text

Click to Toggle View

CISA warns of actively exploited Linux privilege elevation flaw. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added two vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog, including a Linux kernel privilege elevation flaw. The high-severity flaw tracked as CVE-2024-1086 was first disclosed on January 31, 2024, as a use-after-free problem in the netfilter: nf_tables component, but was first introduced by a commit in February 2014. Netfilter is a framework provided by the Linux kernel that allows various networking-related operations, such as packet filtering, network address translation (NAT), and packet mangling. The vulnerability is caused because the 'nft_verdict_init()' function allows positive values to be used as a drop error within the hook verdict, causing the 'nf_hook_slow()' function to execute a double free when NF_DROP is issued with a drop error that resembles NF_ACCEPT. Exploitation of CVE-2024-1086 allows an attacker with local access to achieve privilege escalation on the target system, potentially gaining root-level access. The issue was fixed via a commit submitted in January 2024, which rejects QUEUE/DROP verdict parameters, thus preventing exploitation. The fix has been backported to multiple stable kernel versions as listed below: In late March 2024, a security researcher using the alias 'Notselwyn' published a detailed write-up and proof-of-concept (PoC) exploit on GitHub, showcasing how to achieve local privilege escalation by exploiting the flaw on Linux kernel versions between 5.14 and 6.6. While most Linux distrobutions pushed out fixes fairly quickly, Red Hat had not pushed out a fix until March, making it possible that threat actors used the public exploit on compromised systems. CISA did not share specific details about how the vulnerability is exploited, but BleepingComputer has seen posts on hacking forums about the public exploits. The cybersecurity agency has now given federal agencies until June 20, 2024, to apply the available patches. If updating is not possible, admins are recommended to apply the following mitigations: The second flaw CISA added on the KEV catalog this time, also setting the due date to June 20, is CVE-2024-24919, an information disclosure vulnerability impacting VPN devices from Check Point. Following the vendor's disclosure and security update release for this flaw, researchers from Watchtowr Labs published their analysis, underlining that the vulnerability is far worse than what Check Point's bulletin reflected.

Daily Brief Summary

MALWARE // CISA Flags Exploited Linux Kernel Flaw and Urges Patch Application

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) added a significant Linux kernel privilege elevation flaw, CVE-2024-1086, to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation.

Originally detected in the Linux netfilter's nf_tables component, the high-severity flaw involves a use-after-free error introduced in a 2014 commit but disclosed in January 2024.

Attackers exploiting this vulnerability can escalate privileges to root level on affected systems, especially utilizing a public proof-of-concept exploit available since late March 2024 by security researcher 'Notselwyn'.

While many Linux distributions quickly responded with patches, Red Hat delayed its patch release, exposing systems longer to potential attacks.

CISA has mandated federal agencies to update their systems by June 20, 2024, to mitigate the risk, paralleling the deadline for a newly reported CVE impacting VPN devices.

Administrators unable to update immediately are advised to apply specific mitigations to limit exploit risks until patches can be applied.