Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CISA warns about the active exploitation of vulnerability of the Linux kernel escalation
Global Security

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

AdminBy AdminJune 18, 2025No Comments2 Mins Read
Linux Kernel Privilege Escalation Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 18, 2025Red LakshmananLinux / vulnerability

Linux core privilege vulnerability of escalation

Cybersecurity and US Infrastructure Agency (CISA) accommodate Lack of security that affects the Linux kernel in well -known exploited vulnerabilities (Ship) Catalog, stating that it is actively exploited in the wild.

Vulnerability, Cve-2023-0386 (CVSS assessment: 7.8) is an incorrect property error in the Linux kernel, which can be used to escalate privileges in sensitive systems. It was secured in early 2023.

“The Linux kernel contains improper vulnerability of rights management, where unauthorized access to the Setuid file with the capabilities was found in the linux kernel subsystem in how the user copies the file from the nose to another attachment,” the agency said.

Cybersecurity

“This Uid display error allows the local user to develop their privileges in the system.”

It is now unknown how the lack of security is used in the wild. In a report published in May 2023, Datadog stated that the trivial vulnerability and that it works, deceiving the core to create a suidic binary that belongs to the root in the folder like “/TMP” and fulfillment.

“CVE-2023-0386 is that when the core copied the file from the file system to the” upper “directory, it did not check whether the user/group was changed in this file in the current user names, company company company. – Note.

“This allows an unauthorized user to smuggle suida from the” lower “catalog to the” upper “catalog, using Overlayfs as a mediator.”

Later in the same year, Cloud Becurity Wiz told about two security vulnerabilities called Gameover (lie) (Cve-2013-32629 and Cve-2013-2640) affect UNIX systems that have led to similar consequences, such as CVE-2023-0386.

“These deficiencies allow you to create specialized executable files, which, when performing provides the possibility of escalation of privileges, take root on the affected machine,” Wiz researchers said.

Federal Civil Executive Agency (FCEB) should apply the necessary patches by July 8, 2025 to provide their networks from active threats.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.