Skip to content
Threat Feed
critical advisory

Multiple Vulnerabilities in Red Hat Hardened Images RPMs

Remote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.

Multiple vulnerabilities affect Red Hat Hardened Images RPMs. A remote, anonymous attacker could exploit these weaknesses to compromise the system. The vulnerabilities could lead to bypassing security precautions, causing a denial-of-service condition, disclosing sensitive information, or performing unspecified attacks, including potential code execution. The specifics of the vulnerable RPMs (jq and pyOpenSSL) are mentioned, highlighting a focus on common utilities. While the exact CVEs are not specified in this brief, the potential for code execution elevates the risk and requires immediate attention. Defenders should focus on identifying and patching vulnerable systems to prevent exploitation.

Attack Chain

  1. Attacker identifies a vulnerable Red Hat Hardened Images RPM (jq or pyOpenSSL) running on a target system.
  2. Attacker crafts a malicious payload tailored to exploit a specific vulnerability within the identified RPM.
  3. The attacker leverages a network connection to send the malicious payload to the target system.
  4. The vulnerable RPM processes the payload, triggering the vulnerability (e.g., buffer overflow, arbitrary code injection).
  5. The attacker gains unauthorized access to the system with the privileges of the compromised process.
  6. The attacker escalates privileges to gain root access, potentially by exploiting further vulnerabilities or misconfigurations.
  7. The attacker installs malware or modifies system files to establish persistence.
  8. The attacker performs malicious activities, such as data exfiltration, denial-of-service attacks, or further lateral movement within the network.

Impact

Successful exploitation of these vulnerabilities in Red Hat Hardened Images RPMs could result in significant damage. An attacker could gain complete control over the affected systems, leading to data breaches, system outages, and further compromise of the network. The lack of specific vulnerability details makes quantifying the scope of impact difficult, but the potential for code execution makes this a high-priority threat. Affected sectors are broad due to the widespread use of Red Hat systems.

Recommendation

  • Deploy the Sigma rule Detect Vulnerable Red Hat Package Installation to identify systems installing or upgrading the jq or pyOpenSSL packages, which may indicate a vulnerable system.
  • Investigate systems identified by the Sigma rule for unusual network activity or suspicious processes to find potentially compromised hosts.
  • Monitor process creation events for unexpected execution of binaries by the jq or pyOpenSSL processes to detect potential exploitation using the Detect Suspicious Process Execution by Vulnerable RPM Sigma rule.

Detection coverage 2

Detect Vulnerable Red Hat Package Installation

medium

Detects the installation or upgrade of potentially vulnerable Red Hat packages (jq or pyOpenSSL).

sigma tactics: vulnerability sources: file_event, linux

Detect Suspicious Process Execution by Vulnerable RPM

high

Detects suspicious process execution originating from processes associated with jq or pyOpenSSL.

sigma tactics: execution techniques: T1059.004 sources: process_creation, linux

Detection queries are kept inside the platform. Get full rules →