CISA sounds the alarm over high-severity bug in all major Linux distros

Linux
He can work for you (Image credit: Linux Foundatiox)

A high-severity Linux vulnerability capable of granting abusers root access to target endpoints is being exploited in the wild, researchers have warned.

The flaw is found in Polkit’s pcexec component, which can be found in pretty much all major Linux distributions. Tracked as CVE-2021-4034, the flaw is dubbed PwnKit, and is described as a memory corruption bug.

It allows threat actors full root privileges on Linux systems with default setups. What’s more, threat actors can exploit the bug without leaving a trace on the compromised endpoint.

“The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands," the NIST security advisory reads.

“An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.”

CISA raises alarm

Cybersecurity researchers from Qualys were the first to spot the flaw, which appears to have been sitting under everyone’s noses for almost 12 years. The flaw was found in virtually all versions of pkexec, the first of which was released back in 2009.

It was also said a proof-of-concept (PoC) is already available online, prompting Qualys to urge Linux admins to patch up as soon as possible. The patches were released by the Polkit development team and can be found on GitLab.

The Cybersecurity and Infrastructure Agency (CISA) also warned users that the flaw is being actively abused, BleepingComputer reported. It gave all Federal Civilian Executive Branch Agencies (FCEB) a deadline, expiring on July 18, to patch up all their Linux endpoints.

Polkit is a set of tools used to control system-wide privileges on Linux, and manages the communications between non-privileged and privileged processes. It was previously called PolicyKit.

Even though security researchers are warning that the flaw is being abused in the wild, they did not say who the threat actors are, or who they are using the flaws against.

Via BleepingComputer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
Close up of the Linux penguin.
A new Linux backdoor is hitting US universities and governments
Digital image of a lock.
Nvidia systems could be facing another worrying security flaw
A person's fingers type at a keyboard, with a digital security screen with a lock on it overlaid.
Veeam backup software has a serious security flaw - here's how to stay safe
Avast cybersecurity
An unpatched Windows zero-day flaw has been exploited by 11 nation-state attackers
Latest in Software & Services
TinEye website
I like this reverse image search service the most
A person in a wheelchair working at a computer.
Here’s a free way to find long lost relatives and friends
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
This people search finder covers all the bases, but it's not perfect
That's Them home page
Is That's Them worth it? My honest review
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
A person at a desktop computer working on spreadsheet tables.
Trello vs Jira: which project management solution is best for you?
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring