CrackArmor: AppArmor Flaws Enable Local Privilege Escalation
Qualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.
In March 2026, Qualys disclosed a set of critical vulnerabilities collectively named “CrackArmor” affecting AppArmor, a Linux kernel security module. These flaws allow a local attacker to escalate privileges to root. While specific CVEs were not detailed in the initial Reddit post, the Qualys blog (linked in the source) will likely contain them. The vulnerabilities stem from weaknesses in AppArmor’s parsing and enforcement mechanisms, allowing for crafted AppArmor profiles or interactions with existing profiles to bypass security restrictions. This poses a significant risk to any Linux system using AppArmor for security, potentially leading to complete system compromise. Defenders need to investigate patching and workarounds immediately.
Attack Chain
- Attacker gains initial local access to a vulnerable Linux system.
- Attacker crafts a malicious AppArmor profile or modifies an existing one to exploit parsing vulnerabilities. This could involve exploiting weaknesses in how AppArmor handles specific characters, escape sequences, or profile directives.
- The attacker loads the crafted profile using
apparmor_parseror a similar tool. - The vulnerable AppArmor implementation fails to correctly parse the profile, leading to a bypass of security restrictions.
- Attacker executes a program or script that would normally be blocked by AppArmor under a correctly enforced profile.
- Due to the bypassed restrictions, the attacker gains access to resources or capabilities normally restricted to the root user.
- Attacker leverages these elevated privileges to execute arbitrary commands as root.
- The attacker achieves full system compromise, including data exfiltration, installation of malware, or other malicious activities.
Impact
Successful exploitation of these vulnerabilities allows a local, unprivileged attacker to gain complete control over a vulnerable Linux system. This can lead to data breaches, system downtime, and the installation of persistent backdoors. The scope of impact depends on the prevalence of vulnerable AppArmor versions in different Linux distributions. Systems relying on AppArmor for security isolation are particularly at risk, potentially undermining container security or application sandboxing.
Recommendation
- Consult the Qualys blog post (linked in references) for specific CVE identifiers and patch information as soon as it is released.
- Apply patches for AppArmor as soon as they become available from your Linux distribution vendor.
- Monitor system logs for suspicious use of
apparmor_parserand other AppArmor utilities. - Audit existing AppArmor profiles for potential vulnerabilities and misconfigurations.
Detection coverage 2
Detect AppArmor Profile Loading via apparmor_parser
mediumDetects execution of apparmor_parser, which is used to load AppArmor profiles, potentially loading malicious profiles.
Detect Modification of AppArmor Profiles
lowDetects attempts to modify AppArmor profiles, which could indicate an attempt to introduce malicious rules or bypass existing restrictions.
Detection queries are kept inside the platform. Get full rules →