Hackers Are Exploiting PwnKit Linux Vulnerability: CISA Warns

Share post:

The Cybersecurity and Infrastructure Security Agency (CISA) has warned that attackers are actively exploring the very vulnerable Linux flaw known as PwnKit in the wild.

The CISA also gave all Federal Civilian Executive Branch Agencies (FCEB) until July 18 to patch their Linux servers against PwnKit and block exploitation attempts. Although addressed to federal agencies, the CISA asked public and private sector organizations to ensure that the vulnerability is patched.

The bug, which is tracked as CVE-2021-403, is a memory corruption flaw that can be exploited by unauthenticated users to gain root privileges on Linux systems by default configurations. The vulnerability was found in the Polkit’s pkexec component used by all major distributions (including Ubuntu, Debian, Fedora, and CentOS).

The CISA encouraged government agencies and private sector organizations to use Microsoft Exchange to validate the transition from Basic Auth legacy authentication methods to Modern Auth alternatives.

FCEB agencies have also been advised to block Basic auth after migrating to Modern Auth as it makes it harder for threat actors to extract password and credentials fillings.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways