Attackers could gain root access using vulnerability in Linux Kernel Netfilter Firewall
THREAT LEVEL: Amber.
For a detailed advisory, download the pdf file here.
A flaw in the Linux kernel has been discovered. If exploited, this flaw could allow a local attacker to gain privileges on targeted systems, allowing them to escape containers, execute arbitrary code, or cause a kernel panic.
This heap out-of-bounds write vulnerability has been assigned CVE-2022-25636 and affects the Linux kernel’s netfilter subcomponent. Netfilter is a Linux kernel framework that enables various networking-related operations such as packet filtering, network address translation, and port translation. The bug is related to an issue with the framework’s incorrect handling of the hardware offload feature, which could be utilized by a local attacker to cause a denial-of-service (DoS) or possibly execute arbitrary code.
This issue has been fixed in Linux kernel version 5.7 and vendors such as RedHat, SUSE, Ubuntu, and Oracle has also made a fix available for the same.
Potential MITRE ATT&CK TTPs are:TA0042: Resource DevelopmentT1588: Obtain CapabilitiesT1588.006: Obtain Capabilities: VulnerabilitiesTA0001: Initial AccessT1190: Exploit Public-Facing ApplicationTA0040: ImpactT1499: Endpoint Denial of ServiceT1499.004: Endpoint Denial of Service: Application or System Exploitation
Vulnerability Details
Patch Link
References
https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
https://access.redhat.com/security/cve/CVE-2022-25636
https://www.openwall.com/lists/oss-security/2022/02/21/2
https://security-tracker.debian.org/tracker/CVE-2022-25636
https://linux.oracle.com/cve/CVE-2022-25636.html
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox