Tag
XZ Utility Vulnerability Allows Remote Code Execution
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.
Potential Chroot Container Escape via Mount
2 rulesThe rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.
Chroot Execution in Container Context on Linux
2 rules 1 TTPDetects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.
CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation
2 rules 1 TTP 1 CVEThe 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.
Potential Root Effective Shell from Non-Standard Path via Auditd
2 rules 1 TTPThis rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.
Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket
2 rules 2 TTPs 1 CVEThis rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.
Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel
2 rules 1 TTP 1 CVEA local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.
CUPS Vulnerability Allows Local Privilege Escalation
2 rules 1 TTPA local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.
Sudo Privilege Escalation Vulnerabilities
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.
PackageKit Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.
Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS
2 rules 2 TTPsMultiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
ProFTPD SQL Injection Vulnerability
2 rules 1 TTPAn anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.
Linux Persistence via Sudoers.d File Manipulation
3 rules 2 TTPsAttackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.
NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)
2 rules 1 TTP 1 CVEA heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.
NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)
2 rules 1 TTP 1 CVENestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.
util-linux Vulnerability Allows DoS and Information Disclosure
2 rules 2 TTPsA local attacker can exploit a vulnerability in util-linux to perform a denial of service attack and disclose sensitive information.
Multiple Vulnerabilities in Red Hat Hardened Images RPMs
2 rules 7 TTPsRemote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.
SecureDrop Client Code Execution via Gzip Extraction Vulnerability
2 rules 1 TTP 2 CVEsA compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.
xrdp Privilege Escalation Vulnerability (CVE-2026-32107)
2 rules 2 TTPs 1 CVE 1 IOCxrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.
rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)
2 rules 1 TTP 1 CVErsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.
Radare2 Command Injection Vulnerability (CVE-2026-41015)
2 rules 1 TTP 1 CVERadare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.
Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name
3 rules 1 TTPZarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.
jq JSON Processor Hash Table Collision Denial-of-Service Vulnerability (CVE-2026-40164)
2 rules 1 TTP 1 CVEA denial-of-service vulnerability exists in jq versions prior to commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784 due to the use of a hardcoded seed in MurmurHash3, enabling attackers to craft JSON objects that trigger hash collisions and cause excessive CPU consumption.
Nix Package Manager Arbitrary File Overwrite Vulnerability
2 rules 1 TTP 2 CVEsA flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.
parseusbs OS Command Injection Vulnerability (CVE-2026-40030)
2 rules 1 TTP 1 CVE 1 IOCparseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.
Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop
2 rules 4 TTPs 1 CVEPodman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.
OpenSSH GSSAPI Vulnerability Leads to Potential Denial-of-Service
2 rules 1 TTPA remote, anonymous attacker can exploit a vulnerability in OpenSSH GSSAPI and Ubuntu Linux to trigger undefined behavior or a potential denial-of-service attack.
prompts.chat Path Traversal Vulnerability (CVE-2026-22661)
2 rules 1 TTP 1 CVEA path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.
Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)
2 rules 1 TTP 1 CVEA critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.
Kubectl Network Configuration Modification
3 rules 2 TTPsThis rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.
BPFDoor Lock File Access
2 rules 2 TTPsBPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.
Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution
2 rules 2 TTPsA local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.
Compromised trivy-action GitHub Action Leads to Credential Theft
2 rules 2 TTPsThe trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.
act Project Cache Poisoning Vulnerability Leads to Potential RCE
2 rules 1 TTP 1 CVEA vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.
Multiple Vulnerabilities in NGINX and NGINX Plus
2 rules 1 TTPMultiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.
Incus Instance Template Vulnerability CVE-2026-33897
3 rules 1 TTPA vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.
Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS
2 rules 3 TTPsA remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.
Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs
2 rules 1 TTPThe 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.
GNU libc Vulnerability Allows Local Code Execution
2 rules 1 TTPA local attacker can exploit a vulnerability in GNU libc to execute arbitrary program code on Linux systems.
Unauthenticated CLI Escape Vulnerability (CVE-2026-3587)
2 rules 2 TTPs 1 IOCAn unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface of a device, leading to full compromise and root access on the underlying Linux-based OS, as described in CVE-2026-3587.
Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation
2 rules 3 TTPsA local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.
Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)
2 rules 1 TTPA guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.
Inner Warden Security Agent Capabilities
2 rules 1 TTPThe open-source Inner Warden project is a security agent leveraging eBPF for kernel-level monitoring and autonomous response actions like IP blocking and process termination, aiming to create a distributed security mesh.
Potential snap-confine Privilege Escalation via CVE-2026-3888
2 rules 1 TTPAn unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.
Persistnux - Linux Persistence Detection Tool
3 rules 3 TTPsPersistnux is a bash-based tool designed to identify known Linux persistence mechanisms used by attackers to maintain access to compromised systems, generating detailed reports for DFIR analysis.
CrackArmor: AppArmor Flaws Enable Local Privilege Escalation
2 rules 1 TTPQualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.
Linux Shell Invocation via Env Command
2 rules 1 TTPThe 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.
Curl or Wget Execution from Container Context
2 rules 2 TTPsThis rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.
Uncommon Destination Port Connection by Web Server on Linux
2 rules 4 TTPsThe rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.
Linux Log Clearing Attempts via Common Utilities
3 rules 1 TTPAdversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.
High Command Line Entropy Detected for Privileged Commands on Linux
2 rules 2 TTPsA machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.
Suspicious Modification of Sensitive Linux Files
3 rules 1 TTPThis threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.
Nsenter to PID Namespace via Auditd
2 rules 1 TTPThis rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.
Linux Cron File Creation for Persistence
2 rules 1 TTPAn attacker may create new cron files in cron directories to establish persistence on a Linux system, potentially leading to privilege escalation and arbitrary code execution.
Unusual Process Connecting to Docker or Containerd Socket
2 rules 3 TTPsAn unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.
Suspicious SUID Binary Execution on Linux
3 rules 2 TTPsThis rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.
Suspicious Process Accessing Sensitive Identity Files via Auditd
3 rules 2 TTPsThis rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.
pyp2spec Code Injection Vulnerability
3 rules 1 TTPpyp2spec before 0.14.1 is vulnerable to code injection by writing PyPI package metadata into generated spec files without escaping RPM macro directives, allowing malicious packages to execute arbitrary commands on the build machine.
Detection of Python Base64 Encoded Execution on Linux
2 rules 2 TTPsThis brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.
Chmod Activity Targeting Sensitive Linux Directories
2 rules 1 TTPAttackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.
Suspicious Unshare Usage for Namespace Manipulation
2 rules 2 TTPsThe `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.
Suspicious Unshare Usage for Container Escape and Privilege Escalation
2 rules 2 TTPsThe rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.
Nsenter Execution with Target Flag Inside Container
2 rules 1 TTPThe rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.