Getting root and executing code: upgrade Linux to avoid losing data

Tomcat

Professional
Messages
2,689
Reaction score
915
Points
113
CISA adds a new bug to its catalog, which gives the hacker complete freedom of action.

The CISA added a Linux kernel vulnerability to the catalog of known Exploited vulnerabilities ( KEV ), citing evidence of active exploitation.

CVE-2024-1086 (CVSS score 3.1: 7.8) is related to a use-after-free (UAF) bug in the netfilter component and allows a local attacker to increase the privileges of a regular user to root and execute arbitrary code. The vulnerability was fixed in January 2024. However, the exact nature of attacks that exploit the vulnerability is currently unknown.

Netfilter is a platform provided by the Linux kernel that allows you to implement various network operations in the form of custom handlers to facilitate packet filtering, network address translation, and port translation.

A recently discovered flaw affecting the security products of Check Point network gateways (CVE-2024-24919 with a CVSS rating of 3.1: 7.5) has also been added to the KEV catalog. This vulnerability allows an attacker to read certain information on Internet-connected gateways with remote VPN or mobile access enabled. The recorded attack attempts are mainly aimed at remote access scenarios through old local accounts with password authentication that is not recommended.

Due to the active use of CVE-2024-1086 and CVE-2024-24919, federal agencies are advised to apply the latest patches by June 20, 2024, to protect their networks from potential threats.
 
Top