• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa warns of active exploitation of 'pwnkit' linux vulnerability in

CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wild

You are here: Home / General Cyber Security News / CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wild
June 29, 2022

The U.S. Cybersecurity and Infrastructure Security Company (CISA) this week moved to include a Linux vulnerability dubbed PwnKit to its Recognised Exploited Vulnerabilities Catalog, citing proof of active exploitation.

The issue, tracked as CVE-2021-4034 (CVSS score: 7.8), arrived to mild in January 2022 and concerns a circumstance of area privilege escalation in polkit’s pkexec utility, which allows an approved consumer to execute commands as a further consumer.

Polkit (formerly named PolicyKit) is a toolkit for managing program-large privileges in Unix-like working units, and delivers a system for non-privileged procedures to connect with privileged procedures.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Productive exploitation of the flaw could induce pkexec to execute arbitrary code, granting an unprivileged attacker administrative legal rights on the focus on machine and compromising the host.

It is really not quickly apparent how the vulnerability is getting weaponized in the wild, nor is there any info on the identity of the menace actor that might be exploiting it.

Also bundled in the catalog is CVE-2021-30533, a security shortcoming in Chromium-centered web browsers that was leveraged by a malvertising risk actor dubbed Yosec to deliver hazardous payloads last 12 months.

CyberSecurity

Also, the agency added the recently disclosed Mitel VoIP zero-day (CVE-2022-29499) as nicely as five Apple iOS vulnerabilities (CVE-2018-4344, CVE-2019-8605, CVE-2020-9907, CVE-2020-3837, and CVE-2021-30983) that were being not long ago uncovered as owning been abused by Italian adware seller RCS Lab.

To mitigate any potential risk of publicity to cyberattacks, it is really suggested that businesses prioritize timely remediation of the issues. Federal Civilian Govt Branch Agencies, even so, are demanded to mandatorily patch the flaw by July 18, 2022.

Observed this write-up fascinating? Comply with THN on Facebook, Twitter  and LinkedIn to examine extra distinctive information we post.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Hackers Deploy Shadowpad Backdoor and Target Industrial Control Systems in Asia
Next Post: New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads new 'fabricscape' bug in microsoft azure service fabric impacts linux»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.