• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa warns of active exploitation of 'pwnkit' linux vulnerability in

CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wild

You are here: Home / General Cyber Security News / CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wild
June 29, 2022

The U.S. Cybersecurity and Infrastructure Security Company (CISA) this week moved to include a Linux vulnerability dubbed PwnKit to its Recognised Exploited Vulnerabilities Catalog, citing proof of active exploitation.

The issue, tracked as CVE-2021-4034 (CVSS score: 7.8), arrived to mild in January 2022 and concerns a circumstance of area privilege escalation in polkit’s pkexec utility, which allows an approved consumer to execute commands as a further consumer.

Polkit (formerly named PolicyKit) is a toolkit for managing program-large privileges in Unix-like working units, and delivers a system for non-privileged procedures to connect with privileged procedures.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Productive exploitation of the flaw could induce pkexec to execute arbitrary code, granting an unprivileged attacker administrative legal rights on the focus on machine and compromising the host.

It is really not quickly apparent how the vulnerability is getting weaponized in the wild, nor is there any info on the identity of the menace actor that might be exploiting it.

Also bundled in the catalog is CVE-2021-30533, a security shortcoming in Chromium-centered web browsers that was leveraged by a malvertising risk actor dubbed Yosec to deliver hazardous payloads last 12 months.

CyberSecurity

Also, the agency added the recently disclosed Mitel VoIP zero-day (CVE-2022-29499) as nicely as five Apple iOS vulnerabilities (CVE-2018-4344, CVE-2019-8605, CVE-2020-9907, CVE-2020-3837, and CVE-2021-30983) that were being not long ago uncovered as owning been abused by Italian adware seller RCS Lab.

To mitigate any potential risk of publicity to cyberattacks, it is really suggested that businesses prioritize timely remediation of the issues. Federal Civilian Govt Branch Agencies, even so, are demanded to mandatorily patch the flaw by July 18, 2022.

Observed this write-up fascinating? Comply with THN on Facebook, Twitter  and LinkedIn to examine extra distinctive information we post.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Hackers Deploy Shadowpad Backdoor and Target Industrial Control Systems in Asia
Next Post: New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads new 'fabricscape' bug in microsoft azure service fabric impacts linux»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.