Potential Privilege Escalation via SUID/SGID Abuse on Linux
This rule detects potential privilege escalation attempts on Linux systems by identifying processes running with root privileges but initiated by non-root users, indicative of SUID/SGID abuse.
This detection rule, sourced from Elastic, identifies instances where a process executes with root privileges (UID/GID 0) while the real user/group ID is non-zero. This condition suggests that the process has been granted SUID/SGID permissions, potentially allowing it to run with elevated privileges. Attackers may exploit such misconfigurations to escalate their privileges to root or establish persistence mechanisms. The rule focuses on Linux systems and leverages Elastic Defend data to identify such events. The initial publication date of the rule was in June 2024, with updates made as recently as May 2026. This type of misconfiguration can lead to significant security breaches.
Attack Chain
- A user (non-root) executes a binary that has the SUID or SGID bit set.
- The system checks the permissions of the executable and identifies the SUID/SGID bit.
- The process spawns with the effective UID/GID set to the owner/group of the executable file (typically root).
- The process attempts to perform actions that require elevated privileges.
- If the SUID/SGID binary is vulnerable, the attacker can leverage it to execute arbitrary commands as root.
- The attacker escalates privileges to root, gaining full control over the system.
- The attacker installs a backdoor for persistent access.
- The attacker performs malicious activities, such as data exfiltration or system compromise.
Impact
Successful exploitation of SUID/SGID misconfigurations can grant an attacker root-level access to a Linux system. This can lead to complete system compromise, including data theft, installation of malware, and the potential for lateral movement to other systems on the network. A single compromised system can be leveraged to attack other internal assets.
Recommendation
- Deploy the provided Sigma rule to your SIEM to detect potential SUID/SGID exploitation (see the
rulessection). - Review the SUID/SGID binaries identified by the rule and verify their configurations to ensure they are correctly set and necessary.
- Implement enhanced monitoring and logging for SUID/SGID execution attempts to detect and respond to similar threats in the future (Data Source: Elastic Defend).
- Consider implementing stricter access controls and reducing the number of SUID/SGID binaries on the system to minimize the attack surface.
- Investigate the parent process of the flagged binaries to determine the origin of the execution and whether it aligns with expected behavior.
Detection coverage 2
Privilege Escalation via SUID/SGID Binary Execution
mediumDetects execution of SUID/SGID binaries by non-root users, potentially leading to privilege escalation.
Suspicious SUID/SGID Binary Modification
lowDetects modification of SUID/SGID bits on binaries, which might indicate an attacker preparing for privilege escalation.
Detection queries are kept inside the platform. Get full rules →