Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Linux Polkit Vulnerability Enables Root Access on Most Distros, XIot Devices.
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Cyber > Linux Polkit Vulnerability Enables Root Access on Most Distros, XIot Devices.
Cyber

Linux Polkit Vulnerability Enables Root Access on Most Distros, XIot Devices.

Editorial Desk
Last updated: January 28, 2022 3:35 pm
Editorial Desk
Share
SHARE

A trivially exploitable vulnerability has been disclosed in Polkit, a component installed by default on many Linux distributions. Successful exploits of this vulnerability would grant an attacker full root privileges on the host. Most devices in the Extended Internet of Things (XIoT) are likely affected.

Here’s what you need to know:

What is PwnKit?

The vulnerability, which Qualys has named PwnKit (CVE-2021-4034) has been in Polkit—once known as PolicyKit—for more than a decade. Polkit manages system-wide privileges on Linux operating systems and oversees how non-privileged processes communicate with privileged ones.

This memory-corruption issue likely impacts most devices in the XIoT, including industrial OT, enterprise IoT, and medical IoT equipment. PwnKit is a local privilege escalation vulnerability, meaning that an attacker would already need to have access to a vulnerable host in order to exploit the vulnerability.

Patches, Mitigations Available

Users who manage any Linux devices should determine their exposure and patch immediately. Qualys said it sent patches to affected distributions on Jan. 11; If a patch is not yet available for a particular Linux distribution, Qualys suggests as a mitigation that users remove the SUID-bit from Polkit’s pkexec function.

Which Distributions are Affected?

In its advisory, Qualys said it was able to trigger the vulnerability in Polkit’s pkexec function and gain root access on default installations of Ubuntu, Debian, Fedora, and CentOS. It’s likely that other distributions are vulnerable, and exploitable.

Have There Been Public Attacks?

Qualys said it is unaware of public exploits. Qualys did not publish its proof-of-concept exploit because of the ease of exploitation involved with attacking this vulnerability. Others, however, have already reverse-engineered the bug and published PoCs online, indicating that more malicious exploits may not be far behind.

Evidence of Exploitation

Users can find artifacts of exploits in logs, but Qualys cautions that the vulnerability may be quietly exploited as well.

“This exploitation technique leaves traces in the logs (either “The value for the SHELL variable was not found in the /etc/shells file” or “The value for environment variable […] contains suspicious content”),” Qualys said in its advisory. “However, please note that this vulnerability is also exploitable without leaving any traces in the logs.”

Beating the Drum on SBOMs

The disclosure of PwnKit is going to further inflame discussions about the security of open source software. Recently, the White House gathered tech leaders to discuss the issue in the context of the Log4j vulnerability in Apache. Log4j is a logging framework native to Apache that was ubiquitous across IT and operational technology environments. Multiple vulnerabilities and exploits surfaced post-disclosure, and the Biden administration expressed concern over the use of open source components in software used in critical infrastructure.

The issue when vulnerabilities such as PwnKit and Log4j arise is that users may be blind to these components running inside commercial or homegrown applications, so they may not understand their exposure when critical vulnerabilities are disclosed.

The Biden administration, last year in an Executive Order signed in May of last year, mandated that the federal government take steps to beef up the security of the software supply chain. The EO was in reaction to the SolarWinds compromise of late 2020, which demonstrated the fragility of the supply chain and reinforced the need for secure software development practices and oversight of products used by the federal government and within critical infrastructure.

One critical component of the EO was the need for a software bill of materials (SBOM) to be made available for each product used by the federal government. SBOMs describe the software components used in the development of a commercial product.

The availability of such a list would remove the mystery as to whether components such as Polkit, Log4j and others are running under the covers. Asset owners and IT administrators responsible for vulnerability management would immediately understand their exposure and be able to prioritise patching and other mitigations.

By Editorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article Christopher Clark Delta Drone Delta Drone International To Divest Parazero For A$6 Million In Cash
Next Article PayID Fraud Payments Apple plans to turn iPhones into payment terminals
Leave a comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Linux Polkit

Tech Articles

Re-Engagement Campaigns - Inactive Subscribers

Re-Engagement Campaigns To Bring Back Inactive Subscribers

If you’re managing an email list, you’ve probably noticed that…

November 26, 2024
Influence Of Artificial Intelligence (AI) On Humanity

The Rising Influence Of Artificial Intelligence (AI) On Humanity And Identity

Humanity in Transition: The Rising Influence of Artificial Intelligence on…

November 8, 2024
Content creation platforms leveraged for phishing attacks

Phishing Attacks Exploit Content Creation Platforms

Content creation platforms are being leveraged for phishing attacks. Its…

September 17, 2024

Recent News

Ransomware attack forces hundreds of small Indian banks offline, sources say
Cyber

Ransomware Attack Forced Almost 300 Indian Banks Offline

2 Min Read
Global Financial Crime Prevention Software
Cyber

Global Financial Crime Prevention Software Spend to Surpass $28 Billion by 2027

2 Min Read
Gov flags new rules after Optus hack
Cyber

Federal Government Prepares New Data Breach Notification Rules After Optus Hack.

2 Min Read
Advanced Bots 95% Undetected
Cyber

Research Finds 95% Of Advanced Bots Go Undetected On Websites

4 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

December, 10, 2024

Contact

Contact Information.
Melbourne, Australia

Werribee 3030

Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.


Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account