PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access


Google Released a Proof-of-Concept (PoC) for a critical security vulnerability, identified as CVE-2024-26581, which has been discovered in the Linux kernel and poses significant risks to systems worldwide.

This vulnerability, reported by Google’s kCTF team, affects the netfilter component, specifically the nft_set_rbtree module. It has been classified with a CVSS 3.1 severity score of 7.8, indicating a high level of risk.

EHA

The vulnerability was found in the Linux kernel’s Netfilter subsystem. This issue occurs in the nft_set_rbtree. rbtree lazy gc on insert, which might collect an end interval element just added in a transaction and skip the end interval elements not yet active.”

CVE-2024-26581 arises from an issue in the garbage collection process of the rbtree data structure used in the netfilter’s nftables subsystem.

The flaw occurs when the system fails to properly handle end interval elements during lazy garbage collection on insert operations. This oversight can lead to the collection of elements that have just been added, potentially allowing unauthorized access or execution of malicious code.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Impact and Severity

The vulnerability is rated as high severity due to its potential impact on confidentiality, integrity, and availability. The attack vector is local, requiring low complexity and privileges, with no user interaction needed. This makes it an attractive target for attackers aiming to exploit Linux-based systems.

The vulnerability affects multiple versions of the Linux kernel. However, several distributions have already addressed the issue:

  • Ubuntu: Versions such as Bionic (4.13.0-16.19), Focal (5.4.0-177.197), Jammy (5.15.0-105.115), and Mantic (6.5.0-28.29) have been patched.
  • Debian: Similar updates have been applied to mitigate the vulnerability.

POC Released

The proof-of-concept exploit, hosted on GitHub by Google’s security research team, demonstrates how this vulnerability can be leveraged by malicious actors.

The PoC is part of a broader initiative to improve security awareness and encourage the development of effective mitigations. It serves as a crucial resource for security professionals seeking to understand and address the potential risks associated with CVE-2024-26581.

This PoC, now available on GitHub, highlights a critical vulnerability in the Linux kernel that has far-reaching implications for users and administrators alike.

Download Free Incident Response Plan Template for Your Security Team – Free Download

Mitigation and Recommendations

System administrators are urged to apply the latest security patches to affected systems immediately. The patches have been released upstream and are available for various distributions. Users should ensure their systems are updated to the latest kernel versions to mitigate potential exploitation.

The discovery of CVE-2024-26581 has prompted a swift response from the open-source community and major Linux distributions. Security advisories and patches have been issued to address the vulnerability, highlighting the collaborative effort to maintain the security and integrity of Linux systems.

As Linux continues to be a cornerstone of global IT infrastructure, vulnerabilities like CVE-2024-26581 underscore the importance of proactive security measures and timely updates. Organizations and individuals relying on Linux systems should remain vigilant and protect their systems against such critical vulnerabilities.



Source link