Security Advisory: Critical Linux Vulnerability
January 27th, 2022: CyberHoot has investigated a Linux vulnerability tracked as CVE-2021-4034 that is part of most Linux distributions, leads to escalation of privileges up to root, and is trivial ...

Or login with email
Join our subscribers list to get the latest news, updates and special offers directly in your inbox
Polkit (formerly PolicyKit) provides an organized way for non-privileged processes to communicate with privileged processes and can be used to execute commands with elevated privileges using the command pkexec, followed by the command intended to be executed (with root permission). This vulnerability essentially allows any unprivileged user to gain full administrative privileges on a vulnerable host by exploiting this vulnerability in its default configuration.
Researchers who discovered the bug said in a report that they developed a proof-of-concept (PoC) exploit and obtained full root privileges on default installations of CentOS, Debian, Fedora, and Ubuntu. They also believe that other Linux distributions are “likely vulnerable and probably exploitable.”
Patch your Linux systems as soon as possible. Most Linux distributions have released fixes for this issue since learning of it back in Oct. 2021. RedHat outlined a workaround in their publication here which we also publish below. Here are links to the advisory and patching information for Red Hat, Debian, and Ubuntu.
Given the large attack surface on this vulnerability, CyberHoot strongly recommends patching all Linux machines as quickly as possible. That means within the next few days. It’s predicted that public exploits will be seen very quickly given the attention this vulnerability is getting.
If patches aren’t available or you cannot patch for any reason, here’s a mitigation step you can take: “Remove the SUID-bit from pkexec as a temporary mitigation,” Researchers suggested, giving this example:
# chmod 0755 /usr/bin/pkexec
If you’re a subscriber to CyberHoot’s services, you’ll have access to our Policy and Process library which contains the vulnerability alert management process document. This document prescribes how to respond to situations like this and in what time frame. If your company has not yet adopted a VAMP-like process, now is a great time to get started.
hackeridiot Nov 11, 2021 0 13
hackeridiot Jan 27, 2022 0 11
hackeridiot Jun 25, 2022 0 11
hackeridiot Feb 12, 2022 0 8
hackeridiot Apr 19, 2022 0 8
hackeridiot Jan 27, 2022 0 176
hackeridiot Nov 11, 2021 0 298
hackeridiot Oct 31, 2021 0 103
hackeridiot Oct 31, 2021 0 7
hackeridiot Jun 30, 2022 0 0
Bitcoin Cash (BCH) today dropped to a low of $102.08 following reports that a… The...
hackeridiot Jun 30, 2022 0 0
Polkadot, the eleventh biggest cryptocurrency with a market cap of over $7 billion,...
hackeridiot Jun 29, 2022 0 0
On December 7, 2021, Google announced it had sued two Russian men allegedly responsible...
hackeridiot Jun 30, 2022 0 0
21Shares AG, the biggest issuer of cryptocurrency exchange-traded products (ETPs)...
hackeridiot May 26, 2022 0 3
Information Case Only; No Formal Investigation by The Black Vault These photographs...
hackeridiot Mar 23, 2022 0 51
Exit scams are pretty common these days and with the darknet markets, this is even...
hackeridiot Jun 25, 2022 0 1
A 33-year-old Illinois man was sentenced to two years in prison today following...
hackeridiot Jun 30, 2022 0 0
Emotet detection tool for Windows OS. How to use Download EmoCheck from the Releases...
hackeridiot Jun 30, 2022 0 0
Robinhood listed Chainlink’s LINK on Tuesday. LINK’s price rose by 9% but has lost…...
Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.