Microsoft on Tuesday disclosed a set of two privilege escalation vulnerabilities in the Linux operating system that could potentially allow threat actors to carry out an array of nefarious activities.
Collectively called “Nimbuspwn,” the flaws “can be chained together to gain root privileges on Linux systems, allowing attackers to deploy payloads, like a root backdoor, and perform other malicious actions via arbitrary root code execution,” Jonathan Bar-Or of the Microsoft 365 Defender Research Team said in a report.
On top of that, the defects — tracked as CVE-2022-29799 and CVE-2022-29800 — could also be weaponized as a vector for root access to deploy more sophisticated threats such as ransomware.
Specifically, they relate to a combination of directory traversal (CVE-2022-29799), symbolic link (aka symlink) race, and time-of-check to time-of-use (CVE-2022-29800) flaws, leading to a scenario where an adversary in control of a rogue D-Bus service can plant and execute malicious backdoors on the compromised endpoints.
Users of network-dispatcher are highly recommended to update their instances to the latest version to mitigate potential arising out of exploiting the flaws.
“The growing number of vulnerabilities on Linux environments emphasize the need for strong monitoring of the platform’s operating system and its components,” Bar-Or said. Read more:https://bit.ly/3shg7gP
You can also read this: Benchmarking Linux Security – Latest Research Findings