• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
7 year old polkit flaw lets unprivileged linux users gain root access

7-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access

You are here: Home / General Cyber Security News / 7-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access
June 11, 2021

A 7-calendar year-outdated privilege escalation vulnerability discovered in the polkit process provider could be exploited by a malicious unprivileged regional attacker to bypass authorization and escalate permissions to the root person.

Tracked as CVE-2021-3560 (CVSS score: 7.8), the flaw influences polkit versions in between .113 and .118 and was identified by GitHub security researcher Kevin Backhouse, who explained the issue was launched in a code commit produced on Nov. 9, 2013. Pink Hat’s Cedric Buissart pointed out that Debian-centered distributions, based mostly on polkit .105, are also susceptible.

Stack Overflow Teams

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Polkit (née PolicyKit) is a toolkit for defining and handling authorizations in Linux distributions, and is utilized for letting unprivileged processes to connect with privileged processes.

“When a requesting course of action disconnects from dbus-daemon just prior to the get in touch with to polkit_method_bus_title_get_creds_sync starts off, the approach are not able to get a one of a kind uid and pid of the course of action and it can not confirm the privileges of the requesting method,” Pink Hat stated in an advisory. “The optimum threat from this vulnerability is to details confidentiality and integrity as effectively as program availability.”

RHEL 8, Fedora 21 (or later on), Debian “Bullseye,” and Ubuntu 20.04 are some of the well-known Linux distributions impacted by the polkit vulnerability. The issue has been mitigated in version .119, which was launched on June 3.

gain root-level access

“The vulnerability is amazingly uncomplicated to exploit. All it normally takes is a few instructions in the terminal working with only regular tools like bash, get rid of, and dbus-send,” stated Backhouse in a compose-up revealed yesterday, including the flaw is brought on by sending a dbus-mail command (say, to build a new consumer) but terminating the procedure though polkit is nonetheless in the center of processing the request.

Prevent Ransomware Attacks

“dbus-mail” is a Linux inter-method communication (IPC) system which is made use of to mail a information to D-Bus message bus, allowing for interaction in between various procedures managing concurrently on the similar machine. Polkit’s plan authority daemon is applied as a provider connected to the technique bus to authenticate qualifications securely.

In killing the command, it triggers an authentication bypass because polkit mishandles the terminated message and treats the ask for as nevertheless it arrived from a course of action with root privileges (UID ), thus immediately authorizing the ask for.

“To trigger the vulnerable codepath, you have to disconnect at just the ideal second,” Backhouse said. “And mainly because there are multiple processes included, the timing of that ‘right moment’ differs from just one operate to the next. Which is why it normally usually takes a couple of attempts for the exploit to be successful. I’d guess it really is also the motive why the bug was not beforehand learned.”

Buyers are encouraged to update their Linux installations as shortly as doable to remediate any possible risk arising out of the flaw.

Discovered this post fascinating? Observe THN on Facebook, Twitter  and LinkedIn to examine much more special content material we article.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «new cyber espionage group targeting ministries of foreign affairs New Cyber Espionage Group Targeting Ministries of Foreign Affairs
Next Post: Live Cybersecurity Webinar — Deconstructing Cobalt Strike live cybersecurity webinar — deconstructing cobalt strike»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.