Tuesday, May 28, 2024

New Linux NetFilter Kernel Flaw Let Attackers Gain Root Privileges

A recently found Linux NetFilter kernel vulnerability, identified as CVE-2023-32233, enables unprivileged local users to gain root-level privileges and full control over the affected system. However, the severity of the flaw has not yet been assessed.

The security issue with Netfilter nf_tables results from accepting invalid configuration updates, leading to subsystem state corruption through certain invalid batch requests.

New Linux NetFilter Kernel Flaw

Netfilter, an essential part of the Linux kernel, can be manipulated to create a use-after-free vulnerability, allowing unauthorized access and manipulation of kernel memory.

Security researchers developed and shared a proof-of-concept exploit to demonstrate the exploitation of CVE-2023-32233, a vulnerability affecting multiple Linux kernel versions, including the current stable release, v6.3.1, but requiring local access a Linux device for exploitation.

Engineer Pablo Neira Ayuso submitted a Linux kernel source code commit that introduces two functions to handle the lifecycle of anonymous sets in the Netfilter nf_tables subsystem, effectively preventing memory corruption and the potential privilege escalation to the root level by addressing the use-after-free issue.

Researchers Patryk Sondej and Piotr Krysiuk found a security flaw in Linux that enables unprivileged local users to gain root access, sharing their exploit privately with the Linux kernel team along with detailed techniques and source code to aid in developing a fix.

The analysts announced their intention to release the exploit and its detailed techniques, in accordance with the Linux-distros list policy, on May 15th, 2023, within the required 7-day timeframe.

Obtaining root-level access on Linux servers is a valuable tool for hackers, but CVE-2023-32233 requires attackers to first gain local access to the system before exploiting it, which is a mitigating factor.

While apart from this, in the mainline kernel git repository, the fix for the problem is available.


Latest articles

Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The...

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles