Summary: A researcher has identified a critical decade-old vulnerability rated 9.9 that affects all GNU/Linux systems, potentially allowing attackers to gain complete control over these devices. The flaw is currently under investigation, with full disclosure expected soon, raising concerns about the security of millions of systems.
Threat Actor: Unknown | unknown
Victim: GNU/Linux Systems | GNU/Linux Systems
Key Point :
- The vulnerability has a severity score of 9.9 out of 10, indicating a high potential for damage if exploited.
- Despite its severity, no CVE identifiers have been assigned, causing delays in addressing the issue.
- Simone Margaritelli has opted for full disclosure instead of responsible disclosure, which may accelerate the fix but also increase exposure to attacks.
- Experts draw parallels between this vulnerability and the Log4j/Log4Shell vulnerability due to its low complexity and high impact.
- Linux users are urged to stay informed and prepare for potential patches as the situation develops.
A researcher claims to have found a decade-old vulnerability rated 9.9 that affects all GNU/Linux systems, allowing attackers to gain control of vulnerable devices. The flaw is under investigation, with full disclosure expected next week.
Simone Margaritelli, a cybersecurity researcher and Linux developer has discovered a critical Linux vulnerability that could allow attackers to gain complete control of vulnerable systems. This Linux vulnerability affects GNU/Linux systems, specifically for Linux Remote code execution. If confirmed, it could be oneof the worst vulnerabilities in history.
A Decade-Old Flaw:
The vulnerability, which has reportedly existed for over a decade, impacts all GNU/Linux systems. While specific details remain confidential, the severity score of 9.9 out of 10, confirmed by major Linux distributors like Canonical and Red Hat, indicates the immense potential for damage if exploited.
The Controversy:
Despite the severity of the issue, no Common Vulnerabilities and Exposures (CVE) identifiers have been assigned yet, and developers are still debating whether certain aspects of the vulnerability pose a security risk. This disagreement has led to delays in addressing the issue and has caused frustration among security researchers.
Margaritelli has publicly expressed his disappointment with the handling of the disclosure. He claims to have provided proof-of-concept exploits, but developers have been more focused on debating the vulnerability’s impact rather than working towards a solution.
He has, therefore, decided not to go for responsible disclosure instead of full disclosure of the flaw. While his decision could accelerate the fix race but will also expose millions of Linux systems to malicious attacks if no swift countermeasures are taken.
For your information, Simone Margaritelli, aka evilsocket, is a renowned cybersecurity expert who has created numerous tools for professionals and researchers worldwide. One of his most notable contributions is Bettercap, an open-source tool designed for Man-in-the-Middle (MITM) hacking attacks and network penetration testing.
The vulnerability may affect known exposed services like OpenSSH and possibly filtering services like Net Filter, although there is no indication of which service may be affected, and these are just hypotheses.
As per the latest updates, the flaw will be initially disclosed to the Openwall security mailing list on September 30th, followed by full public disclosure on October 6th. Linux users are advised to stay informed about official updates and patch systems as soon as patches are available.
* Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago.
* Full disclosure happening in less than 2 weeks (as agreed with devs).
* Still no CVE assigned (there should be at least 3, possibly 4, ideally 6).
* Still no working fix.
* Canonical, RedHat and… pic.twitter.com/N2d1rm2VeR— Simone Margaritelli (@evilsocket) September 23, 2024
Brian Fox, CTO of software security platform, Sonatype, and governing board member of the Open Source Security Foundation, has found similarities between this vulnerability and the Log4j/Log4Shell vulnerability (CVE-2021-44228). Fox is working closely with Sonatype’s research team and the open-source security community to understand the gravity of the issue and possible mitigation methods.
“While we don’t have the technical details yet, a vulnerability with a 9.9 CVSS indicates a low complexity to exploit and signs are pointing to the flaw existing at the core of the system. Considering this is Linux, the scope of this vulnerability is massive and successful exploitation could be devastating — everything from your wifi router to the grid keeping the lights on runs on Linux,” Brain explained.
He further added “This combination of low complexity and high usage is reminiscent of Log4Shell, though the scale of usage here is much more significant. I understand the logic in phasing out disclosure, as this vulnerability will take time to find and fix, however, we should also expect threat actors to be scrutinizing the commit history and looking for clues to exploit.”
“As we wait for more details to come out, enterprise security teams must scour their environments and SBOMs to understand where they might be vulnerable and be prepared to patch. Cancel your vacations because, on October 6, it could be a race against attackers,” Brian emphasised.
RELATED TOPICS
- Telegram-Controlled TgRat Trojan Targets Linux Servers
- Critical Flaws Found in GNU C Library, Major Linux Distros at Risk
- Goldoon Botnet Hits D-Link Devices by Exploiting 9-Year-Old Flaw
- 9-year-old Windows flaw dropped ZLoader malware in 111 countries
- 7-Year-Old 0-Day in Microsoft Office Exploited to Drop Cobalt Strike
Source: https://hackread.com/old-vulnerability-9-9-impacts-all-gnu-linux-systems