• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
amazon's hotpatch for log4j flaw found vulnerable to privilege escalation

Amazon’s Hotpatch for Log4j Flaw Found Vulnerable to Privilege Escalation Bug

You are here: Home / General Cyber Security News / Amazon’s Hotpatch for Log4j Flaw Found Vulnerable to Privilege Escalation Bug
April 21, 2022

The “hotpatch” unveiled by Amazon Web Products and services (AWS) in reaction to the Log4Shell vulnerabilities could be leveraged for container escape and privilege escalation, permitting an attacker to seize command of the fundamental host.

“Apart from containers, unprivileged procedures can also exploit the patch to escalate privileges and get root code execution,” Palo Alto Networks Unit 42 researcher Yuval Avrahami claimed in a report revealed this 7 days.

CyberSecurity

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The issues — CVE-2021-3100, CVE-2021-3101, CVE-2022-0070, and CVE-2022-0071 (CVSS scores: 8.8) — affect the hotfix answers delivered by AWS, and stem from the point that they are designed to lookup for Java processes and patch them against the Log4j flaw on the fly but without having ensuring that the new Java processes are operate inside of the limitations imposed on the container.

“Any system managing a binary named ‘java’ – inside of or outside the house of a container – is thought of a candidate for the warm patch,” Avrahami elaborated. “A destructive container as a result could have bundled a malicious binary named ‘java’ to trick the set up incredibly hot patch answer into invoking it with elevated privileges.”

In the subsequent step, the elevated privileges could be weaponized by the malicious ‘java’ procedure to escape the container and obtain total management about the compromised server.

CyberSecurity

A rogue unprivileged process, in a related way, could have created and executed a destructive binary named “java” to trick the hotpatch company into operating it with elevated privileges.

End users are suggested to enhance to the mounted very hot patch model as shortly as feasible to prevent opportunity exploitation, but only after prioritizing patching against the actively exploited Log4Shell flaws.

“Containers are generally used as a security boundary amongst purposes working on the same machine,” Avrahami stated. “A container escape enables an attacker to lengthen a marketing campaign over and above a single application and compromise neighboring providers.”

Located this post interesting? Stick to THN on Fb, Twitter  and LinkedIn to examine much more distinctive content we submit.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «five eyes nations warn against impending russian cyber attacks Five Eyes nations warn against impending Russian cyber attacks
Next Post: Hackers Sneak ‘More_Eggs’ Malware Into Resumes Sent to Corporate Hiring Managers hackers sneak 'more eggs' malware into resumes sent to corporate hiring»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.