<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Linux — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/linux/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:18:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/linux/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Direct Kubelet API Access via Process Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</link><pubDate>Mon, 04 May 2026 21:18:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</guid><description>This rule detects potential direct Kubelet API access attempts on Linux by identifying process executions whose arguments contain URLs targeting Kubelet ports (10250/10255) enabling discovery and lateral movement in Kubernetes environments.</description><content:encoded><![CDATA[<p>This detection identifies potential direct Kubelet API access attempts on Linux systems. The Kubelet, acting as the primary node agent, exposes an API accessible via ports 10250 and 10255. Attackers may exploit this API to enumerate pods, fetch logs, or even attempt remote execution. This access can lead to significant breaches in Kubernetes environments, facilitating discovery, lateral movement, and ultimately, compromise of sensitive data or control over cluster resources. The detection focuses on identifying process executions where the command-line arguments contain URLs targeting these Kubelet ports, indicating a potential attempt to interact with the Kubelet API directly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the Kubernetes cluster or a host with network access to the Kubelet ports.</li>
<li>The attacker uses a utility like <code>curl</code>, <code>wget</code>, <code>python</code>, or similar tools to craft an HTTP request targeting the Kubelet API on ports 10250 or 10255.</li>
<li>The request includes a path like <code>/pods</code>, <code>/runningpods</code>, <code>/metrics</code>, <code>/exec</code>, or <code>/containerLogs</code> to gather information about the cluster&rsquo;s state and configuration.</li>
<li>The attacker examines the response to identify potential targets for lateral movement, such as specific pods or containers of interest.</li>
<li>The attacker attempts to execute commands within a container using the <code>/exec</code> endpoint, potentially leveraging exposed service account tokens or other credentials.</li>
<li>The attacker uses gathered information to move laterally to other pods or nodes within the cluster, escalating privileges as they go.</li>
<li>The attacker compromises sensitive data or critical applications running within the Kubernetes cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full cluster compromise. Attackers can gain unauthorized access to sensitive data, disrupt critical applications, and move laterally to other resources within the Kubernetes environment. This could lead to significant financial losses, reputational damage, and legal liabilities. The potential impact includes data breaches, denial of service, and complete control over the Kubernetes infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubelet API Access via Process Arguments</code> to your SIEM to detect suspicious process executions.</li>
<li>Restrict access to Kubelet ports 10250/10255 at the network layer to limit pod-to-node or host-to-node traffic as recommended in the overview section.</li>
<li>Harden Kubelet configuration by disabling anonymous authentication and enforcing webhook authentication/authorization as described in the overview section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>kubelet</category><category>lateral-movement</category><category>discovery</category><category>execution</category><category>linux</category></item><item><title>XZ Utility Vulnerability Allows Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-xz-code-execution/</link><pubDate>Mon, 04 May 2026 09:34:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-xz-code-execution/</guid><description>A remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.</description><content:encoded><![CDATA[<p>A vulnerability exists within the xz compression utility that allows for arbitrary code execution. While the specific details of the vulnerability are not disclosed in this advisory, the potential impact is severe. An unauthenticated, remote attacker can leverage this flaw to execute code on a vulnerable system. The affected component is the xz utility, a widely used data compression tool in Linux distributions. Defenders should assume a broad potential impact, including data compromise, system instability, and potential for lateral movement within a compromised network. The lack of detailed information necessitates immediate investigation and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable system running the xz utility.</li>
<li>The attacker crafts a malicious payload designed to exploit the undisclosed vulnerability within xz.</li>
<li>The attacker delivers the malicious payload to the vulnerable system. The specific delivery mechanism is not detailed (e.g., network service, malicious file).</li>
<li>The xz utility processes the malicious payload, triggering the vulnerability.</li>
<li>Due to the vulnerability, the attacker gains the ability to execute arbitrary code on the targeted system.</li>
<li>The attacker&rsquo;s code executes with the privileges of the xz process, potentially allowing for elevated privileges.</li>
<li>The attacker may then install a backdoor or other persistent mechanism to maintain access to the compromised system.</li>
<li>The attacker pivots to other systems on the network or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the targeted system. This can lead to complete system compromise, data theft, and further malicious activities within the network. Given the widespread use of the xz utility, a large number of systems are potentially vulnerable. The impact could range from disruption of services to significant data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate systems running the xz utility for suspicious activity.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts.</li>
<li>Monitor process execution for unexpected activity originating from the xz utility using process_creation logs.</li>
<li>Implement network monitoring to identify suspicious connections originating from systems where xz is used.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>xz</category><category>code-execution</category><category>linux</category></item><item><title>Potential Chroot Container Escape via Mount</title><link>https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</guid><description>The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>This detection rule monitors for a specific sequence of commands on Linux systems that could indicate an attempt to escape a containerized environment. The attack involves first mounting a file system, typically targeting the host&rsquo;s root file system, and then using the <code>chroot</code> command to change the root directory. This combination, if successful, allows an attacker inside a container to gain unauthorized access to the host system. The rule is designed to identify this uncommon behavior pattern, which is a strong indicator of malicious activity. The rule is applicable to environments utilizing Elastic Defend, SentinelOne Cloud Funnel, and Crowdstrike FDR. The detection looks for this sequence occurring within a 5-minute timeframe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through exploiting a vulnerability or misconfiguration in the application running within the container.</li>
<li>The attacker attempts to mount the host&rsquo;s root filesystem within the container using the <code>mount</code> command, often targeting <code>/dev/sd*</code> devices. This requires sufficient privileges within the container, or the exploitation of a container escape vulnerability to gain such privileges.</li>
<li>The <code>mount</code> command is executed with arguments specifying the device to mount and the mount point within the container&rsquo;s file system.</li>
<li>The attacker then executes the <code>chroot</code> command, changing the root directory of the current process to the mounted host&rsquo;s root filesystem.</li>
<li>After successfully executing <code>chroot</code>, the attacker&rsquo;s perspective shifts to the host&rsquo;s file system, allowing them to access and modify sensitive files and configurations.</li>
<li>The attacker uses their newly acquired access to install backdoors, create new user accounts with elevated privileges, or modify system configurations to establish persistence.</li>
<li>The attacker may attempt to move laterally to other containers or systems within the network, leveraging their compromised position on the host.</li>
<li>The final objective is to gain complete control over the host system and potentially the entire infrastructure, leading to data exfiltration, system disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can have severe consequences, potentially leading to complete compromise of the host system and the data it contains. Depending on the environment, this could affect a single server or spread to many hosts. The compromise of containerized environments can lead to data breaches, service disruption, and reputational damage. Given the sensitive nature of data often processed within containers, the impact can range from financial losses to regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential container escapes.</li>
<li>Enable Elastic Defend integration to collect process data, and ensure Session View data is enabled to enhance visibility as mentioned in the setup guide.</li>
<li>Review and harden container configurations to minimize privileges granted to containerized processes, reducing the attack surface for escape attempts.</li>
<li>Implement network segmentation to limit the potential for lateral movement following a successful container escape.</li>
<li>Monitor process execution logs for unusual mount and chroot command sequences within container environments using Elastic Defend, SentinelOne, and Crowdstrike logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category></item><item><title>Chroot Execution in Container Context on Linux</title><link>https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</guid><description>Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of the <code>chroot</code> command being executed within a Linux containerized environment. It leverages process execution telemetry from Elastic Defend and Auditd Manager to detect potential container escape attempts. The rule focuses on processes where the name is <code>chroot</code> or the command-line arguments contain <code>chroot</code>. Container context is determined by identifying processes with a title matching <code>runc init</code>, a container workload entry leader, or <code>runc</code> as the parent process. Successful container escapes can allow attackers to gain unauthorized access to the host system. The technique is often combined with sensitive host mounts, which are then leveraged after the <code>chroot</code> to access files and processes outside the container.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, potentially through exploiting a vulnerability in the containerized application.</li>
<li>The attacker identifies sensitive host mounts within the container&rsquo;s filesystem, such as <code>/host</code>, <code>/proc/1/root</code>, or other unexpected node paths.</li>
<li>The attacker executes the <code>chroot</code> command, specifying an alternate root filesystem, typically a host-linked mount.</li>
<li>The <code>chroot</code> command redirects system calls to the new root filesystem, effectively isolating the attacker from the container&rsquo;s original environment.</li>
<li>The attacker leverages the new root filesystem to access files, directories, and processes on the host system outside the container&rsquo;s boundaries.</li>
<li>The attacker may then attempt to escalate privileges by exploiting vulnerabilities in host system services or binaries.</li>
<li>The attacker may install malware or establish persistence mechanisms on the host system.</li>
<li>The attacker uses the compromised host system to pivot to other systems on the network or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can lead to full compromise of the underlying host system, potentially impacting all containers running on the same host. This can enable attackers to access sensitive data, disrupt services, and move laterally within the network. In multi-tenant environments, a container escape can compromise the security of other tenants sharing the same infrastructure. A single successful container escape can lead to a widespread breach impacting numerous systems and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Chroot Execution in Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable process execution telemetry from Elastic Defend and Auditd Manager on Linux to ensure the required data is available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the <code>chroot</code> execution was authorized and the target directory is an internal build root versus a host filesystem mount.</li>
<li>Monitor for follow-on shell execution, access to the container runtime socket, or kubelet credential paths, as these are common indicators of container escape attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category><category>chroot</category></item><item><title>CVE-2026-31431 'Copy Fail' Linux Kernel Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</link><pubDate>Sat, 02 May 2026 03:06:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-copy-fail/</guid><description>The 'Copy Fail' vulnerability (CVE-2026-31431) in the Linux kernel allows a local attacker to escalate privileges to root, potentially leading to container breakout and lateral movement in cloud environments.</description><content:encoded><![CDATA[<p>CVE-2026-31431, known as &ldquo;Copy Fail,&rdquo; is a high-severity local privilege escalation vulnerability affecting the Linux kernel&rsquo;s cryptographic subsystem. The vulnerability resides within the algif_aead module of the AF_ALG (userspace crypto API) and results from improper memory handling during in-place operations. An unprivileged user can exploit this flaw to corrupt the cache of readable files, including setuid binaries, resulting in unauthorized root privilege escalation. This vulnerability impacts a wide range of Linux distributions, including Ubuntu 24.04 LTS, Amazon Linux 2023, Red Hat Enterprise Linux (RHEL 10.1), and SUSE 16, as well as other distributions like Debian, Fedora, and Arch Linux. The availability of a working proof-of-concept exploit has raised concerns about potential widespread exploitation, leading to its addition to the CISA KEV catalog.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> The attacker gains limited visibility into the environment (e.g., compromised CI runner, web container) and identifies the kernel version. Kernel version information is obtained without elevated privileges.</li>
<li><strong>Script Execution:</strong> The attacker executes a compact Python script that interacts with standard kernel interfaces, without relying on networking, compilation, or third-party libraries.</li>
<li><strong>AF_ALG Abuse:</strong> The script abuses an interaction between the AF_ALG (asynchronous crypto) socket interface, the splice() system call and improper error handling during a failed copy operation.</li>
<li><strong>Kernel Page Cache Corruption:</strong> This interaction leads to a controlled 4-byte overwrite in the kernel page cache, corrupting sensitive kernel-managed data.</li>
<li><strong>Privilege Escalation:</strong> By corrupting kernel structures associated with credentials or execution context, the attacker escalates their process to UID 0.</li>
<li><strong>Boundary Breach:</strong> The system&rsquo;s privilege boundary is broken, neutralizing SELinux/AppArmor protections, and bypassing local security controls.</li>
<li><strong>Lateral Movement/Container Escape:</strong> The attacker can now use the root privileges gained to perform lateral movement or escape the container.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to full root privilege escalation, resulting in high impact to confidentiality, integrity, and availability. This could facilitate container breakout, multi-tenant compromise, and lateral movement within shared environments. The vulnerability&rsquo;s reliability, stealth (in-memory-only modification), and cross-platform applicability make it particularly dangerous in cloud, CI/CD, and Kubernetes environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all instances of affected products and versions in your environment and prioritize patching (CVE-2026-31431).</li>
<li>Deploy the Sigma rule for suspicious process execution under /tmp, often used in exploit PoCs, and tune for your environment.</li>
<li>Monitor for suspicious AF_ALG socket creation events, as indicated in the Attack Chain, using the provided Sigma rule.</li>
<li>If patches are unavailable, consider implementing network isolation and access controls as interim mitigation measures.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>kernel</category></item><item><title>Potential Root Effective Shell from Non-Standard Path via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</link><pubDate>Fri, 01 May 2026 09:51:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</guid><description>This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies potential privilege escalation attempts on Linux systems by monitoring for processes with a root effective user ID (EUID) but a non-root real user ID (RUID), combined with the use of the <code>-p</code> flag (commonly used to preserve privileges in shells like bash or dash) and execution from a non-standard path (outside of <code>/bin</code>, <code>/sbin</code>, <code>/usr/bin</code>, etc.).  Attackers may copy or link setuid-capable shells or similar helpers into writable locations to regain a root context after local exploitation. This behavior is often associated with post-exploitation activities where attackers attempt to maintain or regain elevated privileges.  The rule relies on Auditd data to provide visibility into process execution events and user context. The original rule was published on 2026-04-24 by Elastic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with limited privileges (e.g., through exploiting a vulnerability or using stolen credentials).</li>
<li>Attacker identifies a writable directory outside of standard system binary paths (e.g., <code>/tmp</code>, <code>/var/tmp</code>).</li>
<li>Attacker copies or creates a symbolic link to a setuid-capable shell (e.g., <code>/bin/bash</code>, <code>/bin/dash</code>) into the identified writable directory. This copied shell retains the setuid bit.</li>
<li>Attacker executes the copied or linked shell from the non-standard path with the <code>-p</code> flag (e.g., <code>/tmp/bash -p</code>). The <code>-p</code> flag instructs the shell to preserve privileges, effectively running with the effective user ID (EUID) of root.</li>
<li>Auditd logs this process execution event, capturing the non-standard path, the use of the <code>-p</code> flag, the root EUID, and the non-root RUID.</li>
<li>The detection rule identifies the process execution event based on the criteria outlined above.</li>
<li>Attacker now has a root shell and can perform administrative tasks, install malware, or further compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack can grant an attacker complete control over the compromised system. This allows them to access sensitive data, install malicious software, modify system configurations, and potentially pivot to other systems on the network. This can lead to data breaches, system downtime, and significant financial losses.  The risk score for this type of activity is considered high due to the potential for significant impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Root Effective Shell from Non-Standard Path via Auditd</code> to your SIEM and tune for your environment.</li>
<li>Ensure that Auditd Manager or Auditbeat is properly configured to collect process execution events with relevant fields (<code>event.action</code>, <code>user.id</code>, <code>user.effective.id</code>, <code>process.args</code>, and <code>process.executable</code>) as described in the rule setup to enable the rule to function correctly.</li>
<li>Investigate any alerts generated by this rule by inspecting <code>process.executable</code>, <code>process.args</code>, <code>process.parent</code>, and the full command line reconstructed in audit logs.</li>
<li>Regularly audit all setuid binaries on the filesystem to identify any unauthorized or malicious setuid executables.</li>
<li>Implement access controls and file integrity monitoring to prevent unauthorized modification of system binaries and writable directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>auditd</category></item><item><title>Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</link><pubDate>Thu, 30 Apr 2026 16:24:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</guid><description>This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>CVE-2026-31431, dubbed Copy Fail, is a Linux kernel vulnerability that allows an attacker to write controlled bytes into the page cache of a readable file by abusing the <code>authencesn</code> AEAD path through AF_ALG and <code>splice()</code>. Public exploitation targets setuid-root binaries such as <code>/usr/bin/su</code>, then executes the corrupted in-memory copy to gain root. The vulnerability lies in the shared host page cache, making container-originated activity a possible node-compromise attempt. This exploit leverages the AF_ALG interface, which, while uncommon for unprivileged users, may be used in specific environments like kernel crypto testing or HSM integrations. Defenders should prioritize patching vulnerable kernels and restricting AF_ALG socket creation for untrusted workloads to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates multiple AF_ALG socket creation events (auditd.data.syscall == &ldquo;socket&rdquo; and auditd.data.a0 == &ldquo;26&rdquo;) or splice operations.</li>
<li>The attacker leverages the vulnerability to corrupt the page cache of a setuid-root binary, such as <code>/usr/bin/su</code>.</li>
<li>The attacker executes the targeted setuid-root binary (e.g., <code>/usr/bin/su</code>).</li>
<li>Due to the corrupted page cache, the executed binary behaves in an unexpected manner, leading to a privilege escalation.</li>
<li>The process transitions to a root UID, indicating successful privilege escalation.</li>
<li>A root shell is spawned, providing the attacker with elevated privileges.</li>
<li>The attacker performs actions requiring root privileges, such as creating persistence mechanisms or accessing sensitive credentials.</li>
<li>The attacker potentially compromises the entire host or node, especially in containerized environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to privilege escalation, allowing attackers to gain root access on the affected Linux system. This can result in complete system compromise, data exfiltration, and the ability to install malware or create persistent backdoors. In containerized environments, a compromised container can lead to node compromise, affecting other containers running on the same host. The vulnerability affects systems running vulnerable kernel versions, potentially impacting a wide range of servers and workstations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Socket Creation Burst&rdquo; to detect initial exploitation attempts based on AF_ALG socket activity.</li>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Privilege Escalation&rdquo; to detect privilege escalation attempts by monitoring executed processes with an effective user ID of root.</li>
<li>Immediately patch the kernel with the vendor fix for CVE-2026-31431 to eliminate the underlying vulnerability.</li>
<li>Until patching is possible, consider blocking <code>algif_aead</code> module loading or restricting AF_ALG socket creation via seccomp for untrusted workloads.</li>
<li>Add audit rules for <code>socket</code>, <code>splice</code>, and <code>bind</code> events as described in the rule&rsquo;s Setup instructions to ensure comprehensive monitoring of AF_ALG related syscalls.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category><category>cve-2026-31431</category></item><item><title>Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel</title><link>https://feed.craftedsignal.io/briefs/2026-04-copy-fail/</link><pubDate>Thu, 30 Apr 2026 13:54:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-copy-fail/</guid><description>A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.</description><content:encoded><![CDATA[<p>A local privilege escalation vulnerability, &ldquo;Copy Fail&rdquo; (CVE-2026-31431), impacts Linux kernels released since 2017. Discovered by Theori&rsquo;s AI-driven pentesting platform Xint Code, the vulnerability allows an unprivileged local attacker to gain root permissions. Theori reported the finding to the Linux kernel security team on March 23, 2026, and patches became available within a week. A proof-of-concept exploit was published, demonstrating a 732-byte script that can root every Linux distribution shipped since 2017. This vulnerability stems from a logic bug in the Linux kernel&rsquo;s authencesn cryptographic template. Theori demonstrated successful exploits on Ubuntu 24.04, Amazon Linux 2023, RHEL 10.1, and SUSE 16.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged local attacker gains access to a vulnerable Linux system.</li>
<li>The attacker utilizes the <code>AF_ALG</code> socket-based interface to access Linux kernel crypto functions from user space.</li>
<li>The attacker uses the <code>splice()</code> system call to perform a controlled 4-byte write in the page cache of a readable file, instead of a normal buffer.</li>
<li>The attacker targets a setuid-root binary file for modification.</li>
<li>The 4-byte write alters the behavior of the setuid-root binary.</li>
<li>The attacker executes the modified setuid-root binary.</li>
<li>Due to the altered behavior, the binary grants the attacker elevated privileges.</li>
<li>The attacker gains root privileges on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the Copy Fail vulnerability (CVE-2026-31431) allows an unprivileged local attacker to gain root privileges on a vulnerable Linux system. Theori demonstrated and confirmed the exploit on Ubuntu 24.04, Amazon Linux 2023, RHEL 10.1, and SUSE 16, highlighting the widespread impact. Multi-tenant Linux hosts, Kubernetes/container clusters, CI runners/build farms, and cloud SaaS environments running user code are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available kernel patches for CVE-2026-31431 on affected Linux distributions, prioritizing multi-tenant environments (e.g., Ubuntu 24.04 LTS, Amazon Linux 2023, RHEL 10.1, SUSE 16).</li>
<li>As an interim mitigation, disable the vulnerable crypto interface by blocking <code>AF_ALG</code> socket creation or disabling the <code>algif_aead</code> module, as described in the overview.</li>
<li>Monitor for the execution of unusual processes after the modification of binaries in <code>/tmp</code> or <code>/var/tmp</code> using the Sigma rule &ldquo;Detect Suspicious Splice Usage for Privilege Escalation&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Detect algif_aead module removal&rdquo; to detect attempts to disable the vulnerable module.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category></item><item><title>CUPS Vulnerability Allows Local Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-cups-privesc/</link><pubDate>Thu, 30 Apr 2026 09:43:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cups-privesc/</guid><description>A local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.</description><content:encoded><![CDATA[<p>A vulnerability exists within the Common Unix Printing System (CUPS), a widely used printing system on Linux and macOS. A local attacker can leverage this flaw to execute arbitrary code with elevated, administrator-level privileges. While the specific details of the vulnerability are not provided in this brief, successful exploitation would grant the attacker full control over the affected system. Apple is the primary maintainer of CUPS. Defenders should focus on identifying and mitigating potential exploitation attempts by monitoring for suspicious CUPS-related processes and file modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial local access to the target system through legitimate means or by exploiting a separate vulnerability.</li>
<li>The attacker identifies the vulnerable CUPS service running on the system.</li>
<li>The attacker crafts a malicious payload designed to exploit the CUPS vulnerability. This payload could be a specially crafted print job or a manipulated configuration file.</li>
<li>The attacker executes the malicious payload, triggering the vulnerability in CUPS.</li>
<li>Due to the vulnerability, CUPS executes the attacker&rsquo;s code with administrator privileges.</li>
<li>The attacker uses the elevated privileges to install persistent backdoors, modify system configurations, or escalate privileges further.</li>
<li>The attacker moves laterally within the network or exfiltrates sensitive data.</li>
<li>The final objective is complete system compromise, data theft, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this CUPS vulnerability allows a local attacker to gain complete control over the affected system. This could lead to data theft, system disruption, or the installation of persistent backdoors. The widespread use of CUPS in Linux and macOS environments makes this a significant threat. If successfully exploited, attackers can achieve complete system compromise and potentially move laterally within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for suspicious CUPS processes being spawned by unusual parent processes using the <code>CUPS Spawning Suspicious Processes</code> Sigma rule.</li>
<li>Inspect CUPS configuration files for unauthorized modifications using the <code>CUPS Configuration File Modification</code> Sigma rule.</li>
<li>Investigate any unexplained privilege escalation events originating from the CUPS service.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cups</category><category>privilege-escalation</category><category>linux</category><category>macos</category></item><item><title>Sudo Privilege Escalation Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-05-sudo-privesc/</link><pubDate>Thu, 30 Apr 2026 09:33:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sudo-privesc/</guid><description>Multiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities in sudo allow a local attacker to escalate privileges to root. The vulnerabilities can be exploited locally, requiring an attacker to already have some level of access to the system. The exact nature of these vulnerabilities is not specified in the source material, but the impact is a complete compromise of the affected system. Defenders should implement detections for suspicious sudo usage patterns and ensure sudo is updated to the latest version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via an unspecified method (e.g., compromised account, physical access).</li>
<li>The attacker identifies a vulnerable version of sudo installed on the system.</li>
<li>The attacker crafts a malicious sudo command or exploits a configuration flaw to leverage one of the vulnerabilities.</li>
<li>Sudo executes the malicious command with elevated privileges due to the vulnerability.</li>
<li>The attacker uses the elevated privileges to modify system files or execute commands as root.</li>
<li>The attacker installs a backdoor or creates a new privileged account for persistent access.</li>
<li>The attacker uses the escalated privileges to access sensitive data or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a local attacker to gain complete control of the affected system. This can lead to data theft, system corruption, or the installation of malware. The number of potential victims is dependent on the number of systems running vulnerable versions of sudo.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unexpected sudo usage patterns, especially commands run with root privileges that deviate from normal administrative tasks. (See Sigma rule &ldquo;Detect Suspicious Sudo Usage&rdquo;).</li>
<li>Enable audit logging for sudo to capture detailed information about command execution.</li>
<li>Regularly update sudo to the latest version to patch known vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>sudo</category><category>linux</category></item><item><title>PackageKit Local Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-packagekit-privesc/</link><pubDate>Thu, 30 Apr 2026 09:09:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-packagekit-privesc/</guid><description>A local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.</description><content:encoded><![CDATA[<p>A privilege escalation vulnerability exists within PackageKit, a suite of tools designed for software management across various Linux distributions. While specific details regarding the vulnerability are currently limited, the core issue allows a local attacker to elevate their privileges on a vulnerable system. This means an attacker with limited access could potentially gain root or administrator-level control, leading to full system compromise. Defenders need to prioritize detecting and mitigating this vulnerability to prevent potential exploitation and unauthorized access. The scope of this vulnerability impacts systems utilizing PackageKit for software management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial limited access to the target Linux system through legitimate means or by exploiting a separate vulnerability.</li>
<li>The attacker identifies the presence of PackageKit on the system and its accessibility to the current user.</li>
<li>The attacker leverages the PackageKit vulnerability. Due to the lack of specific information on the vulnerability, this could involve manipulating PackageKit&rsquo;s API or command-line interface to perform actions with elevated privileges.</li>
<li>PackageKit, due to the vulnerability, incorrectly authorizes the attacker&rsquo;s request.</li>
<li>The attacker executes commands or scripts with elevated privileges, such as root.</li>
<li>The attacker installs malicious software or modifies system configurations to establish persistence.</li>
<li>The attacker further compromises the system, gaining access to sensitive data and potentially pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to escalate their privileges to root, resulting in complete system compromise. This could lead to data theft, system disruption, and the installation of malware. The number of victims and specific sectors targeted are currently unknown. However, given the widespread use of PackageKit across various Linux distributions, a successful exploit could have broad implications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for unexpected PackageKit activity initiated by non-root users, using the &ldquo;PackageKit Privilege Escalation - Unexpected Process Invocation&rdquo; Sigma rule.</li>
<li>Implement the &ldquo;PackageKit Privilege Escalation - File Modification&rdquo; Sigma rule to detect unauthorized modifications to PackageKit configuration files or binaries.</li>
<li>Investigate any suspicious PackageKit processes identified through monitoring logs, focusing on those running with elevated privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category></item><item><title>Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS</title><link>https://feed.craftedsignal.io/briefs/2026-04-rhel-libraw-vulns/</link><pubDate>Wed, 29 Apr 2026 09:54:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rhel-libraw-vulns/</guid><description>Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified within the LibRaw component of Red Hat Enterprise Linux. These vulnerabilities, if successfully exploited, could allow an attacker to achieve arbitrary code execution or trigger a denial-of-service (DoS) condition on a vulnerable system. While the specific CVEs are not detailed in the advisory, the high-level threat remains significant, potentially impacting any system relying on the affected LibRaw library for processing raw image data. Defenders should prioritize patching and monitoring systems utilizing LibRaw to mitigate the risks. This advisory serves as an early warning in advance of any detailed technical release; specific exploit methods will become clearer as details emerge.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable version of LibRaw within a Red Hat Enterprise Linux system. This may involve scanning for specific LibRaw versions or identifying services reliant on the library.</li>
<li>The attacker crafts a malicious raw image file designed to exploit a specific vulnerability in LibRaw&rsquo;s parsing logic.</li>
<li>The attacker delivers the malicious file to the target system. This could involve uploading the file to a web server, emailing it as an attachment, or injecting it into a data stream processed by LibRaw.</li>
<li>The vulnerable LibRaw library attempts to process the malicious image file.</li>
<li>Due to the vulnerability (e.g., a buffer overflow or integer overflow), LibRaw crashes, leading to a denial-of-service. Alternatively, the attacker gains control of the program counter.</li>
<li>The attacker executes arbitrary code within the context of the LibRaw process, potentially gaining control over the entire system.</li>
<li>The attacker uses the initial foothold to escalate privileges and move laterally within the network.</li>
<li>The final objective is to disrupt services and/or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to arbitrary code execution, potentially granting an attacker full control over affected systems. This could result in data breaches, system compromise, and service disruption. A denial-of-service condition could also disrupt critical services reliant on the vulnerable systems. The number of affected systems depends on the prevalence of vulnerable LibRaw versions within Red Hat Enterprise Linux deployments. The specific impact will depend on the privileges of the compromised process and the system&rsquo;s role within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unexpected child processes spawned by applications utilizing LibRaw (see &ldquo;Detect Suspicious Process Creation from LibRaw&rdquo; Sigma rule).</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to LibRaw binaries (see &ldquo;Detect LibRaw Binary Modification&rdquo; Sigma rule).</li>
<li>Investigate and block any anomalous network connections originating from systems utilizing LibRaw.</li>
<li>Consult Red Hat security advisories for specific CVEs and patch information as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>code-execution</category><category>denial-of-service</category><category>linux</category></item><item><title>ProFTPD SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-proftpd-sqli/</link><pubDate>Wed, 29 Apr 2026 09:54:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-proftpd-sqli/</guid><description>An anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.</description><content:encoded><![CDATA[<p>A vulnerability in ProFTPD allows for SQL injection attacks by remote, unauthenticated attackers. The specific flaw and version number are not mentioned in the source, but the generic report indicates a potentially widespread issue affecting publicly accessible ProFTPD servers. Successful exploitation could lead to unauthorized data access, modification, or potentially complete system compromise depending on the database permissions configured for ProFTPD. Defenders should apply all available security patches for ProFTPD.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a ProFTPD server exposed to the internet.</li>
<li>Attacker crafts a malicious SQL injection payload.</li>
<li>Attacker sends the crafted SQL injection payload through a ProFTPD command or parameter.</li>
<li>ProFTPD processes the malicious payload without proper sanitization.</li>
<li>The payload is passed to the underlying database server.</li>
<li>The database executes the injected SQL command.</li>
<li>The attacker retrieves sensitive data or modifies database records.</li>
<li>Attacker may use the gained access to further compromise the server or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability in ProFTPD allows unauthorized access to the underlying database. This can lead to the disclosure of sensitive information, modification of data, or even complete database compromise. The number of victims and sectors targeted are currently unknown, but public-facing ProFTPD servers are at risk. A successful attack could lead to significant data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches for ProFTPD as soon as they are available to remediate SQL injection vulnerabilities.</li>
<li>Monitor ProFTPD logs for suspicious activity and SQL injection attempts (see Sigma rule below).</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in ProFTPD configurations.</li>
<li>Review database access permissions for the ProFTPD user to minimize the impact of potential SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>proftpd</category><category>linux</category></item><item><title>Linux Persistence via Sudoers.d File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-04-sudoers-persistence/</link><pubDate>Mon, 27 Apr 2026 23:12:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sudoers-persistence/</guid><description>Attackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.</description><content:encoded>&lt;p>The sudoers.d directory on Linux systems is designed to allow administrators to manage sudo privileges by adding individual files rather than modifying the main /etc/sudoers file. An attacker who gains initial access to a system can exploit this by creating or modifying files within this directory to grant themselves or other malicious actors elevated privileges. This can be done to ensure persistent access, even if other initial access methods are detected and remediated. The modification of…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>linux</category><category>sudoers</category></item><item><title>NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ntfs3g-heap-overflow/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ntfs3g-heap-overflow/</guid><description>A heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.</description><content:encoded><![CDATA[<p>CVE-2026-40706 describes a heap buffer overflow vulnerability affecting NTFS-3G, specifically versions 2022.10.3 and earlier, before the patch in version 2026.2.25. The vulnerability lies within the <code>ntfs_build_permissions_posix()</code> function in <code>acls.c</code>. An attacker can exploit this flaw by creating a malicious NTFS image. When the affected software attempts to read this specially crafted image, a heap buffer overflow occurs. This is triggered when the software processes a security descriptor containing multiple ACCESS_DENIED Access Control Entries (ACEs), each including WRITE_OWNER permissions, and originating from distinct group Security Identifiers (SIDs). Successful exploitation allows an attacker to corrupt heap memory within the SUID-root ntfs-3g binary, potentially leading to privilege escalation or arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious NTFS image containing a specially designed security descriptor.</li>
<li>The security descriptor includes multiple ACCESS_DENIED ACEs.</li>
<li>Each ACE within the descriptor contains WRITE_OWNER permissions.</li>
<li>The ACEs originate from distinct group SIDs, triggering the overflow condition.</li>
<li>The attacker delivers the malicious NTFS image to a system running a vulnerable version of NTFS-3G. This may occur through physical media or network shares.</li>
<li>The victim system attempts to read the malicious NTFS image using a vulnerable NTFS-3G version, such as during a <code>stat</code>, <code>readdir</code>, or <code>open</code> operation.</li>
<li>The <code>ntfs_build_permissions_posix()</code> function is called to process the security descriptor.</li>
<li>The heap buffer overflow occurs during the processing of the malicious ACEs, corrupting heap memory. This can lead to denial of service or potentially arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40706 allows for heap memory corruption in the ntfs-3g binary, which runs with elevated privileges due to its SUID-root configuration. The observed consequence is memory corruption. Depending on the extent of the corruption, this could lead to denial-of-service or arbitrary code execution. Given the wide usage of NTFS-3G for mounting NTFS volumes on Linux and other systems, a successful exploit could affect a large number of systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NTFS-3G to version 2026.2.25 or later to patch CVE-2026-40706 (reference: <a href="https://github.com/tuxera/ntfs-3g/releases/tag/2026.2.25">https://github.com/tuxera/ntfs-3g/releases/tag/2026.2.25</a>).</li>
<li>Monitor systems for unexpected crashes or errors related to ntfs-3g operations, which may indicate exploitation attempts. Deploy the Sigma rules below to your SIEM and tune for your environment.</li>
<li>Consider implementing stricter access controls and validation measures on NTFS images to prevent the use of malicious images (mitigation based on the vulnerability description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ntfs-3g</category><category>heap-overflow</category><category>privilege-escalation</category><category>linux</category></item><item><title>NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)</title><link>https://feed.craftedsignal.io/briefs/2026-04-nest-recursion-dos/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nest-recursion-dos/</guid><description>NestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.</description><content:encoded><![CDATA[<p>NestJS, a Node.js framework for server-side applications, is vulnerable to an uncontrolled recursion issue. Prior to version 11.1.19, a malicious actor could exploit CVE-2026-40879 by sending a crafted TCP frame containing numerous small, valid JSON messages to a vulnerable NestJS application. The <code>handleData()</code> function recursively processes each message, causing the buffer to shrink with each call. This bypasses the <code>maxBufferSize</code> limit and leads to a call stack overflow. A payload as small as 47 KB is sufficient to trigger a <code>RangeError</code> and crash the application. This vulnerability allows for a denial-of-service attack. The vulnerability has been patched in NestJS version 11.1.19.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a NestJS application running a version prior to 11.1.19.</li>
<li>The attacker crafts a TCP packet containing multiple small, valid JSON messages.</li>
<li>The attacker sends the crafted TCP packet to the vulnerable NestJS application.</li>
<li>The NestJS application&rsquo;s <code>handleData()</code> function receives the TCP packet.</li>
<li>The <code>handleData()</code> function recursively processes each JSON message in the packet.</li>
<li>With each recursive call, the buffer shrinks.</li>
<li>The <code>maxBufferSize</code> is never reached because of the stack overflow.</li>
<li>The call stack overflows, leading to a <code>RangeError</code> and application crash, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40879 leads to a denial-of-service condition. A single attacker can potentially bring down a vulnerable NestJS application with a relatively small payload of approximately 47KB. This can impact businesses relying on the affected NestJS application, leading to service disruptions and potential data loss. The vulnerability affects any application using NestJS versions before 11.1.19, making a large number of applications potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all NestJS applications to version 11.1.19 or later to patch CVE-2026-40879.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious NestJS TCP Payload</code> to identify potentially malicious TCP traffic targeting NestJS applications.</li>
<li>Monitor network traffic for large TCP packets containing many small JSON messages, which may indicate an attempted exploit.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>nestjs</category><category>recursion</category><category>cve-2026-40879</category><category>linux</category></item><item><title>util-linux Vulnerability Allows DoS and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2024-04-util-linux-dos-info-disclosure/</link><pubDate>Wed, 22 Apr 2026 08:08:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-util-linux-dos-info-disclosure/</guid><description>A local attacker can exploit a vulnerability in util-linux to perform a denial of service attack and disclose sensitive information.</description><content:encoded><![CDATA[<p>A vulnerability exists within the util-linux package that can be exploited by a local attacker. While specific details regarding the vulnerable component or version are not provided in the advisory, successful exploitation can lead to a denial-of-service (DoS) condition and the disclosure of sensitive information. The impact is limited to systems where the attacker has local access, but successful exploitation could disrupt services and expose sensitive data to unauthorized users. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential disruptions and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a Linux system running a vulnerable version of util-linux.</li>
<li>Attacker identifies a vulnerable utility within the util-linux package. (Specific utility name not provided).</li>
<li>Attacker crafts a malicious input or command designed to trigger the vulnerability.</li>
<li>Attacker executes the malicious input/command using the vulnerable utility.</li>
<li>The vulnerability causes the targeted utility to crash or enter a non-responsive state, contributing to a denial-of-service condition.</li>
<li>The vulnerability allows the attacker to read sensitive information from the system&rsquo;s memory or file system.</li>
<li>Attacker exfiltrates the disclosed information.</li>
<li>Attacker leverages the disclosed information for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to trigger a denial-of-service condition, potentially disrupting critical system services. The attacker can also disclose sensitive information, leading to potential data breaches or further compromise of the system. The number of affected systems is unknown but depends on the prevalence of the vulnerable util-linux version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate the specific vulnerable utility and version within util-linux to determine the scope of impact using OS package management tools (<code>dpkg</code>, <code>rpm</code>).</li>
<li>Monitor process execution for unusual command-line arguments or behaviors associated with util-linux utilities using <code>process_creation</code> logs.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>util-linux</category><category>denial-of-service</category><category>information-disclosure</category><category>linux</category></item><item><title>Multiple Vulnerabilities in Red Hat Hardened Images RPMs</title><link>https://feed.craftedsignal.io/briefs/2026-04-redhat-hardening-vulns/</link><pubDate>Tue, 21 Apr 2026 08:44:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-redhat-hardening-vulns/</guid><description>Remote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities affect Red Hat Hardened Images RPMs. A remote, anonymous attacker could exploit these weaknesses to compromise the system. The vulnerabilities could lead to bypassing security precautions, causing a denial-of-service condition, disclosing sensitive information, or performing unspecified attacks, including potential code execution. The specifics of the vulnerable RPMs (jq and pyOpenSSL) are mentioned, highlighting a focus on common utilities. While the exact CVEs are not specified in this brief, the potential for code execution elevates the risk and requires immediate attention. Defenders should focus on identifying and patching vulnerable systems to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Red Hat Hardened Images RPM (jq or pyOpenSSL) running on a target system.</li>
<li>Attacker crafts a malicious payload tailored to exploit a specific vulnerability within the identified RPM.</li>
<li>The attacker leverages a network connection to send the malicious payload to the target system.</li>
<li>The vulnerable RPM processes the payload, triggering the vulnerability (e.g., buffer overflow, arbitrary code injection).</li>
<li>The attacker gains unauthorized access to the system with the privileges of the compromised process.</li>
<li>The attacker escalates privileges to gain root access, potentially by exploiting further vulnerabilities or misconfigurations.</li>
<li>The attacker installs malware or modifies system files to establish persistence.</li>
<li>The attacker performs malicious activities, such as data exfiltration, denial-of-service attacks, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in Red Hat Hardened Images RPMs could result in significant damage. An attacker could gain complete control over the affected systems, leading to data breaches, system outages, and further compromise of the network. The lack of specific vulnerability details makes quantifying the scope of impact difficult, but the potential for code execution makes this a high-priority threat. Affected sectors are broad due to the widespread use of Red Hat systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Vulnerable Red Hat Package Installation</code> to identify systems installing or upgrading the <code>jq</code> or <code>pyOpenSSL</code> packages, which may indicate a vulnerable system.</li>
<li>Investigate systems identified by the Sigma rule for unusual network activity or suspicious processes to find potentially compromised hosts.</li>
<li>Monitor process creation events for unexpected execution of binaries by the <code>jq</code> or <code>pyOpenSSL</code> processes to detect potential exploitation using the <code>Detect Suspicious Process Execution by Vulnerable RPM</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>redhat</category><category>vulnerability</category><category>denial-of-service</category><category>information-disclosure</category><category>code-execution</category><category>linux</category></item><item><title>SecureDrop Client Code Execution via Gzip Extraction Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-securedrop-gzip-vuln/</link><pubDate>Sat, 18 Apr 2026 01:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-securedrop-gzip-vuln/</guid><description>A compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.</description><content:encoded><![CDATA[<p>SecureDrop Client, a desktop application designed for secure communication between journalists and sources, is vulnerable to code execution (versions 0.17.4 and below). The vulnerability, identified as CVE-2026-35465, stems from improper filename validation during the extraction of gzip archives. A compromised SecureDrop Server can leverage this flaw to overwrite critical files, such as the SQLite database, on the Client&rsquo;s virtual machine (sd-app). While exploiting this vulnerability requires prior compromise of the hardened SecureDrop Server (accessible only via Tor), successful exploitation leads to significant impact on the confidentiality, integrity, and availability of sensitive source submissions. This issue is similar to CVE-2025-24888, but arises through a different code path. Version 0.17.5 addresses this vulnerability with a more robust fix within the replacement SecureDrop Inbox codebase.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the SecureDrop Server, gaining control over its file handling processes.</li>
<li>Attacker crafts a malicious gzip archive containing filenames with absolute paths (e.g., <code>/opt/securedrop/client/db.sqlite</code>).</li>
<li>Attacker uploads this malicious gzip archive to the compromised SecureDrop Server.</li>
<li>The SecureDrop Client retrieves the malicious gzip archive from the SecureDrop Server via Tor.</li>
<li>The SecureDrop Client attempts to extract the contents of the gzip archive using a vulnerable extraction routine.</li>
<li>Due to improper filename validation, the extraction process overwrites critical files, such as the SQLite database, on the client&rsquo;s virtual machine (sd-app).</li>
<li>The attacker achieves code execution by manipulating the overwritten files to execute arbitrary code upon the next application startup or during normal operation.</li>
<li>The attacker gains unauthorized access to decrypted source submissions and can exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35465 allows a compromised SecureDrop Server to execute arbitrary code on the SecureDrop Client&rsquo;s virtual machine. This leads to a complete breach of confidentiality, integrity, and availability of decrypted source submissions handled by the client. Journalists relying on SecureDrop could have their sources exposed, leading to severe repercussions for both journalists and their sources. The impact is limited to SecureDrop deployments running vulnerable versions (0.17.4 and below).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all SecureDrop Client installations to version 0.17.5 or later to remediate CVE-2026-35465.</li>
<li>Monitor SecureDrop Client systems for unusual file writes, especially to critical directories such as <code>/opt/securedrop/client/</code> using the provided Sigma rule.</li>
<li>Review and harden the SecureDrop Server&rsquo;s security configuration to prevent initial compromise, as exploitation requires prior access to the server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>securedrop</category><category>gzip</category><category>code execution</category><category>vulnerability</category><category>linux</category></item><item><title>xrdp Privilege Escalation Vulnerability (CVE-2026-32107)</title><link>https://feed.craftedsignal.io/briefs/2026-04-xrdp-privesc/</link><pubDate>Fri, 17 Apr 2026 20:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xrdp-privesc/</guid><description>xrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.</description><content:encoded><![CDATA[<p>CVE-2026-32107 affects xrdp, an open-source Remote Desktop Protocol (RDP) server. Specifically, versions up to and including 0.10.5 contain a flaw in the session execution component. The vulnerability stems from the improper handling of errors during the privilege drop process. This allows a local, authenticated attacker to potentially escalate their privileges to root. Successful exploitation requires an additional, unspecified exploit to trigger the vulnerable code path. The vulnerability has been addressed in xrdp version 0.10.6. Defenders should prioritize upgrading affected systems to version 0.10.6 or later. The reported CVSS v3.1 base score is 8.8, indicating a high severity. This vulnerability allows local attackers to execute arbitrary code with elevated privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a system running a vulnerable version of xrdp (&lt;= 0.10.5) with valid user credentials.</li>
<li>The attacker initiates an xrdp session, triggering the vulnerable session execution component.</li>
<li>The xrdp session attempts to drop privileges as part of its normal operation.</li>
<li>An error occurs during the privilege drop process due to the flaw described in CVE-2026-32107.</li>
<li>Due to the improper error handling, the privilege drop fails, or partially fails, leaving the process with elevated privileges.</li>
<li>The attacker exploits this partially dropped or retained privilege context. This step requires a currently unspecified, additional exploit.</li>
<li>The attacker executes arbitrary code with root privileges due to the incomplete privilege drop.</li>
<li>The attacker persists or pivots to other systems based on their elevated access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32107 allows a local attacker to gain root privileges on a vulnerable system. This can lead to complete system compromise, including data theft, modification, or destruction. While the vulnerability requires an additional exploit to be fully realized, the high CVSS score reflects the significant impact of a successful attack. The number of potential victims is dependent on the prevalence of vulnerable xrdp versions within an organization&rsquo;s infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade xrdp to version 0.10.6 or later to remediate CVE-2026-32107, as per the GitHub release notes (<a href="https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6">https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6</a>).</li>
<li>Monitor systems running xrdp for unexpected privilege escalation attempts or suspicious process behavior.</li>
<li>Consider deploying the provided Sigma rule to detect suspicious process creation events related to xrdp exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xrdp</category><category>privilege-escalation</category><category>cve-2026-32107</category><category>linux</category></item><item><title>rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rsync-use-after-free/</link><pubDate>Thu, 16 Apr 2026 07:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rsync-use-after-free/</guid><description>rsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.</description><content:encoded><![CDATA[<p>rsync versions 3.0.1 through 3.4.1 are susceptible to a use-after-free vulnerability identified as CVE-2026-41035. This flaw resides within the <code>receive_xattr</code> function, where an untrusted length value is used during a <code>qsort</code> call. The vulnerability is triggered only when rsync is executed with the <code>-X</code> or <code>--xattrs</code> option, which enables extended attribute handling. While many Linux configurations are vulnerable, the issue is more prevalent on non-Linux platforms. Exploitation of this vulnerability could allow a malicious actor to achieve arbitrary code execution on the target system. Defenders should prioritize patching rsync installations and consider disabling the <code>-X</code> option where extended attributes are not essential.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system where they can influence rsync parameters. This could be through a compromised user account or a vulnerable service.</li>
<li>Attacker crafts a malicious rsync command that includes the <code>-X</code> or <code>--xattrs</code> option to enable extended attribute processing.</li>
<li>The crafted command is executed on the victim machine, targeting a vulnerable rsync version (3.0.1 to 3.4.1).</li>
<li>During the <code>receive_xattr</code> function call, the untrusted length value provided by the attacker is passed to the <code>qsort</code> function.</li>
<li>The <code>qsort</code> function attempts to sort the extended attributes based on the attacker-controlled length.</li>
<li>Due to the manipulated length value, the <code>qsort</code> function accesses memory outside the allocated buffer, leading to a use-after-free condition.</li>
<li>The use-after-free condition allows the attacker to potentially overwrite memory with malicious code.</li>
<li>The attacker&rsquo;s code is executed within the context of the rsync process, granting them control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41035 can lead to arbitrary code execution on the affected system. The impact can range from data corruption to complete system compromise. Given the widespread use of rsync for data synchronization and backups, a successful attack could affect a large number of systems across various sectors. The vulnerability is particularly concerning on non-Linux platforms, where the likelihood of successful exploitation is higher.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade rsync to a version beyond 3.4.1 to patch CVE-2026-41035.</li>
<li>Implement the file integrity monitoring rule to detect unauthorized modification of rsync binaries.</li>
<li>Deploy the Sigma rule to detect rsync commands using the <code>-X</code> or <code>--xattrs</code> option, as those options are required to trigger this vulnerability.</li>
<li>Where possible, disable the use of the <code>-X</code> or <code>--xattrs</code> option for rsync to prevent exploitation of this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rsync</category><category>use-after-free</category><category>cve-2026-41035</category><category>linux</category></item><item><title>Radare2 Command Injection Vulnerability (CVE-2026-41015)</title><link>https://feed.craftedsignal.io/briefs/2026-04-radare2-cmd-injection/</link><pubDate>Thu, 16 Apr 2026 03:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-radare2-cmd-injection/</guid><description>Radare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-41015 is a command injection vulnerability affecting radare2, a reverse engineering framework, when configured on UNIX systems without SSL. The vulnerability occurs in the <code>rabin2</code> utility, specifically when processing Program Database (PDB) files with the <code>-PP</code> option. An attacker can inject arbitrary commands into the PDB name, which are then executed by the system. This vulnerability exists within a specific commit range after version 6.1.2 and before 6.1.3 (commit 9236f44). While radare2 encourages users to use the latest git version, the short timeframe of the vulnerable code increases the risk for users who have not updated within that period. Exploitation could lead to complete system compromise if the radare2 process has sufficient privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable radare2 installation configured on a UNIX system without SSL.</li>
<li>Attacker crafts a malicious PDB file name containing embedded OS commands.</li>
<li>Attacker supplies the crafted PDB file name as input to the <code>rabin2 -PP</code> command.</li>
<li><code>rabin2</code> processes the PDB name without proper sanitization.</li>
<li>The embedded OS commands within the PDB name are executed by the system.</li>
<li>Attacker gains arbitrary code execution within the context of the radare2 process.</li>
<li>Attacker leverages the initial access to escalate privileges.</li>
<li>Attacker performs malicious actions such as data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41015 allows an attacker to execute arbitrary commands on the affected system. This can lead to complete system compromise, including data theft, malware installation, or denial of service. The impact is particularly severe if radare2 is running with elevated privileges. The number of potential victims is dependent on the number of radare2 installations running vulnerable versions and configurations, but it is estimated to be relatively low due to the specific configuration requirements and the short lifespan of the vulnerable code in the git repository.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch from commit 9236f44 to remediate the command injection vulnerability in radare2.</li>
<li>Avoid configuring radare2 on UNIX systems without SSL to reduce the attack surface.</li>
<li>Deploy the Sigma rule <code>radare2-suspicious-rabin2-execution</code> to detect exploitation attempts involving the <code>rabin2</code> command.</li>
<li>Monitor process execution for <code>rabin2</code> with unusual command-line arguments as indicated by the rule <code>radare2-rabin2-pdb-injection</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>radare2</category><category>command-injection</category><category>cve-2026-41015</category><category>linux</category></item><item><title>Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name</title><link>https://feed.craftedsignal.io/briefs/2026-04-15-zarf-path-traversal/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-15-zarf-path-traversal/</guid><description>Zarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.</description><content:encoded><![CDATA[<p>Zarf, a tool for air-gapped deployments, is susceptible to a path traversal vulnerability (CVE-2026-40090) affecting versions prior to v0.74.2. The vulnerability stems from inadequate sanitization of the <code>Metadata.Name</code> field within Zarf package manifests. When a user employs the <code>zarf package inspect sbom</code> or <code>zarf package inspect documentation</code> commands on an untrusted package, the tool constructs output file paths by concatenating a user-controlled output directory with the package&rsquo;s <code>Metadata.Name</code> field. A malicious actor can craft a Zarf package with a manipulated <code>Metadata.Name</code> containing path traversal sequences (e.g., <code>../../</code>), enabling arbitrary file write capabilities within the permissions of the user running the <code>inspect</code> command. This vulnerability allows attackers to write to locations they control, potentially leading to privilege escalation or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Zarf package.</li>
<li>The attacker modifies the <code>zarf.yaml</code> manifest within the package to include a <code>Metadata.Name</code> field containing path traversal sequences (e.g., <code>../../../../tmp/evil</code>).</li>
<li>The attacker repacks the Zarf package, recalculating checksums if necessary.</li>
<li>The attacker distributes the malicious Zarf package.</li>
<li>A victim user downloads the malicious Zarf package.</li>
<li>The victim executes <code>zarf package inspect sbom --output-dir /tmp &lt;malicious-package.tar.zst&gt;</code> or <code>zarf package inspect documentation --output-dir /tmp &lt;malicious-package.tar.zst&gt;</code>.</li>
<li>Zarf extracts the <code>Metadata.Name</code> from the <code>zarf.yaml</code> file.</li>
<li>Zarf constructs an output path by joining the user-specified output directory (/tmp) with the malicious <code>Metadata.Name</code> (<code>../../../../tmp/evil</code>), resulting in <code>/tmp/../../../../tmp/evil</code>. The tool attempts to write the SBOM or documentation data to this path, resulting in writing the file to <code>/tmp/evil</code>. This allows attackers to write files such as SSH authorized keys, cron jobs, or shell profiles.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the file system, limited by the permissions of the user running the <code>zarf package inspect</code> command. This can lead to several critical consequences: privilege escalation by writing to authorized_keys files, arbitrary code execution by writing cron jobs, or persistent compromise by writing to shell profiles. This vulnerability affects users running the <code>zarf package inspect sbom</code> or <code>zarf package inspect documentation</code> command on untrusted packages. The affected packages are go/github.com/zarf-dev/zarf versions &gt;= 0.23.0 and &lt; 0.74.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Zarf to version v0.74.2 or later to patch CVE-2026-40090.</li>
<li>Avoid inspecting unsigned Zarf packages as a workaround until the upgrade is complete, as mentioned in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Zarf Package Inspection with Path Traversal&rdquo; to identify attempts to exploit this vulnerability via command-line arguments.</li>
<li>Monitor file creation events in sensitive directories (e.g., <code>/home/$USER/.ssh</code>, <code>/etc/cron.d</code>) for files created by the zarf binary using the &ldquo;Detect Zarf Arbitrary File Write&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>zarf</category><category>path-traversal</category><category>arbitrary-file-write</category><category>package-inspection</category><category>linux</category></item><item><title>jq JSON Processor Hash Table Collision Denial-of-Service Vulnerability (CVE-2026-40164)</title><link>https://feed.craftedsignal.io/briefs/2026-04-jq-hash-dos/</link><pubDate>Tue, 14 Apr 2026 00:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jq-hash-dos/</guid><description>A denial-of-service vulnerability exists in jq versions prior to commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784 due to the use of a hardcoded seed in MurmurHash3, enabling attackers to craft JSON objects that trigger hash collisions and cause excessive CPU consumption.</description><content:encoded><![CDATA[<p>CVE-2026-40164 identifies a denial-of-service (DoS) vulnerability affecting the <code>jq</code> command-line JSON processor. Prior to commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, <code>jq</code> employed MurmurHash3 with a fixed, publicly known seed (0x432A9843) for all JSON object hash table operations. This weakness allowed a malicious actor to precompute key collisions offline. An attacker could then supply a specially crafted JSON object, roughly 100KB in size, where all keys hash to the same bucket. This forces hash table lookups to degrade from O(1) to O(n) complexity, effectively turning any <code>jq</code> expression into an O(n²) operation, resulting in significant CPU exhaustion. The vulnerability impacts common <code>jq</code> use cases, including CI/CD pipelines, web services, and data processing scripts. The vulnerability has been addressed in commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker analyzes the <code>jq</code> source code and identifies the use of MurmurHash3 with the hardcoded seed 0x432A9843.</li>
<li>The attacker develops a script to generate JSON keys that will collide with each other when hashed using MurmurHash3 and the specific seed.</li>
<li>The attacker crafts a JSON object, approximately 100KB in size, containing numerous colliding keys.</li>
<li>The attacker submits this malicious JSON object to a system running <code>jq</code>, potentially via an API endpoint or as input to a data processing script.</li>
<li>The <code>jq</code> process parses the JSON object and attempts to perform hash table lookups. Due to the collisions, these lookups become extremely slow, consuming excessive CPU resources.</li>
<li>The CPU utilization on the target system spikes, potentially impacting the performance of other applications.</li>
<li>The <code>jq</code> process may become unresponsive or crash due to resource exhaustion.</li>
<li>The system experiences a denial-of-service condition, preventing legitimate users or processes from accessing <code>jq</code> functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40164 can lead to denial-of-service conditions on systems utilizing the <code>jq</code> JSON processor. The vulnerability impacts environments where <code>jq</code> is used, including CI/CD pipelines, web services, and data processing scripts. If successfully exploited, critical processes relying on <code>jq</code> may become unavailable, leading to disruptions in automated workflows, web application outages, and data processing delays. The relatively small size of the malicious JSON payload (approximately 100KB) makes this vulnerability practical and easily exploitable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>jq</code> version containing commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784 or later to patch the vulnerability (reference: CVE-2026-40164).</li>
<li>Monitor CPU utilization on systems running <code>jq</code> for unusually high activity, especially when processing JSON data, to detect potential exploitation attempts (reference: Attack Chain - Step 6).</li>
<li>Implement resource limits and rate limiting on services that accept JSON input to mitigate the impact of denial-of-service attacks (reference: Impact).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>jq</category><category>denial-of-service</category><category>hash-collision</category><category>CVE-2026-40164</category><category>linux</category></item><item><title>Nix Package Manager Arbitrary File Overwrite Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-nix-privesc/</link><pubDate>Thu, 09 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nix-privesc/</guid><description>A flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.</description><content:encoded><![CDATA[<p>A vulnerability exists in the Nix package manager for Linux systems, stemming from an incomplete fix for CVE-2024-27297. The flaw, identified as CVE-2026-39860, allows for arbitrary file overwrites due to improper handling of symlinks during the registration of fixed-output derivation outputs. This occurs when a derivation builder creates a symlink within the build chroot pointing to an arbitrary location in the filesystem. Subsequently, the Nix process, operating in the host mount namespace, follows this symlink and overwrites the destination with the derivation&rsquo;s output. This issue primarily affects sandboxed Linux builds, while macOS builds remain unaffected. The vulnerability poses a significant risk in multi-user Nix installations where any user with build submission privileges (i.e., those allowed by &lsquo;allowed-users&rsquo;) can exploit this flaw to gain root privileges by modifying sensitive system files. The vulnerability has been patched in Nix versions 2.34.5, 2.33.4, 2.32.7, 2.31.4, 2.30.4, 2.29.3, and 2.28.6.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious user, with privileges to submit builds to the Nix daemon, crafts a Nix derivation designed to exploit the vulnerability.</li>
<li>The malicious derivation includes instructions to create a symlink within the build chroot. This symlink points to a sensitive system file outside of the chroot environment, such as <code>/etc/shadow</code> or <code>/etc/passwd</code>.</li>
<li>The Nix daemon initiates the build process within a sandboxed environment. The derivation builder creates the specified symlink during the build.</li>
<li>During the fixed-output derivation output registration phase, the Nix process attempts to copy the output from the temporary output location to the Nix store.</li>
<li>The Nix process encounters the malicious symlink. Due to insufficient validation, it follows the symlink to the target file in the root filesystem.</li>
<li>The Nix process overwrites the contents of the target file with the derivation&rsquo;s output, effectively modifying the sensitive system file.</li>
<li>By overwriting a file like <code>/etc/shadow</code>, the attacker can manipulate user account information, including password hashes.</li>
<li>The attacker gains root privileges by logging in as a modified or newly created user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability in multi-user Nix installations allows any user capable of submitting builds to the Nix daemon to achieve root privilege escalation. This could lead to complete system compromise, including data theft, modification, or destruction. The severity is critical because it bypasses standard security measures and directly impacts system integrity. The number of potentially affected systems is broad, encompassing any Linux system utilizing a vulnerable version of Nix in a multi-user configuration, which is a common setup.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Nix to version 2.34.5, 2.33.4, 2.32.7, 2.31.4, 2.30.4, 2.29.3, or 2.28.6 to patch CVE-2026-39860.</li>
<li>Monitor process creation events for suspicious activity related to <code>nix-daemon</code> and file modifications in sensitive directories such as <code>/etc/passwd</code> and <code>/etc/shadow</code> using the provided Sigma rule.</li>
<li>Implement file integrity monitoring (FIM) on sensitive system files to detect unauthorized modifications.</li>
<li>Regularly audit and restrict the <code>allowed-users</code> configuration of the Nix daemon to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>nix</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category></item><item><title>parseusbs OS Command Injection Vulnerability (CVE-2026-40030)</title><link>https://feed.craftedsignal.io/briefs/2026-04-parseusbs-command-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-parseusbs-command-injection/</guid><description>parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.</description><content:encoded><![CDATA[<p>parseusbs before version 1.9 is susceptible to an OS command injection vulnerability, identified as CVE-2026-40030. This flaw arises from the application&rsquo;s failure to sanitize the volume listing path argument (-v flag) before passing it to the <code>os.popen()</code> function in Python. This function executes shell commands, and in this case, uses <code>ls</code> to list volume contents. By crafting a malicious volume path containing shell metacharacters, an attacker can inject arbitrary commands that will be executed with the privileges of the parseusbs process. This vulnerability was reported by VulnCheck and patched in subsequent versions. Successful exploitation requires the attacker to control the <code>-v</code> flag&rsquo;s value, typically through command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable parseusbs instance running a version prior to 1.9.</li>
<li>The attacker crafts a malicious volume path argument containing shell metacharacters (e.g., <code>;/</code>).</li>
<li>The attacker executes parseusbs with the <code>-v</code> flag, supplying the crafted volume path as the argument.  Example: <code>parseusbs -v &quot;; command&quot;</code></li>
<li>parseusbs passes the unsanitized volume path argument to the <code>os.popen()</code> function along with the <code>ls</code> command.</li>
<li>The <code>os.popen()</code> function executes the combined command within a shell, injecting the attacker&rsquo;s commands.</li>
<li>The injected commands are executed with the privileges of the parseusbs process.</li>
<li>The attacker gains arbitrary command execution, potentially leading to system compromise.</li>
<li>The attacker achieves persistence, lateral movement, or data exfiltration depending on the injected commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40030 allows an attacker to execute arbitrary commands on the system where parseusbs is running. This can lead to a full system compromise, including data theft, modification, or destruction. Given a CVSS v3.1 score of 7.8, this vulnerability is considered high severity. While specific victim counts and sectors are unknown, any system running a vulnerable version of parseusbs is at risk, particularly if the application processes user-supplied volume paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade parseusbs to version 1.9 or later to remediate CVE-2026-40030 (Reference: Overview).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Parseusbs Command Line Arguments</code> to identify potential exploitation attempts (Reference: Rules).</li>
<li>Monitor command-line arguments passed to parseusbs for shell metacharacters (e.g., <code>;/|&amp;</code>) (Reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>linux</category></item><item><title>Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop</title><link>https://feed.craftedsignal.io/briefs/2026-04-podman-desktop-dos/</link><pubDate>Tue, 07 Apr 2026 21:17:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-podman-desktop-dos/</guid><description>Podman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.</description><content:encoded><![CDATA[<p>Podman Desktop, a graphical tool for container and Kubernetes development, is vulnerable to an unauthenticated remote attack in versions prior to 1.26.2. The exposed HTTP server lacks proper connection limits and timeouts, enabling attackers to exhaust file descriptors and kernel memory. This resource exhaustion leads to denial-of-service conditions, potentially crashing the application or freezing the entire host system. Furthermore, verbose error responses from the server inadvertently disclose internal paths and system details, including usernames on Windows systems. This information leakage facilitates further exploitation attempts. The vulnerability, identified as CVE-2026-34045, requires no authentication or user interaction and is exploitable over a network, making it a significant threat to systems running vulnerable versions of Podman Desktop. Users should update to version 1.26.2 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Podman Desktop instance running a version prior to 1.26.2 exposed on the network.</li>
<li>Attacker connects to the unauthenticated HTTP server exposed by Podman Desktop.</li>
<li>The attacker sends a large number of HTTP requests without proper connection management.</li>
<li>The server fails to enforce connection limits, leading to an exhaustion of available file descriptors on the host system.</li>
<li>The attacker sends specially crafted requests designed to trigger resource-intensive operations, consuming excessive kernel memory.</li>
<li>As file descriptors and kernel memory are depleted, the Podman Desktop application becomes unresponsive.</li>
<li>The system experiences a denial-of-service condition, potentially leading to application crash or a full host freeze.</li>
<li>The attacker analyzes verbose error responses to gain insights into internal paths and system details, potentially including usernames on Windows, to prepare for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34045 can lead to a complete denial-of-service of the Podman Desktop application, disrupting container and Kubernetes development workflows. In severe cases, the entire host system may freeze, requiring a reboot and causing data loss or corruption. The information disclosure aspect of the vulnerability, leaking internal paths and usernames, can aid attackers in crafting more targeted and sophisticated attacks against the compromised system. The lack of authentication makes all installations of vulnerable Podman Desktop versions potential targets, impacting developers and organizations relying on this tool.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Podman Desktop to version 1.26.2 or later to patch CVE-2026-34045.</li>
<li>Implement network segmentation and firewall rules to restrict access to the Podman Desktop HTTP server only to trusted networks, mitigating external exploitation.</li>
<li>Deploy the Sigma rule &ldquo;Detect Excessive HTTP Requests to Podman Desktop&rdquo; to identify potential denial-of-service attempts against vulnerable Podman Desktop instances.</li>
<li>Monitor webserver logs for unusual HTTP requests and error responses from Podman Desktop, correlating them with potential exploitation attempts. Enable webserver logging to activate the rule above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>podman-desktop</category><category>denial-of-service</category><category>information-disclosure</category><category>cve-2026-34045</category><category>linux</category><category>windows</category></item><item><title>OpenSSH GSSAPI Vulnerability Leads to Potential Denial-of-Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-openssh-gssapi-dos/</link><pubDate>Tue, 07 Apr 2026 10:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openssh-gssapi-dos/</guid><description>A remote, anonymous attacker can exploit a vulnerability in OpenSSH GSSAPI and Ubuntu Linux to trigger undefined behavior or a potential denial-of-service attack.</description><content:encoded><![CDATA[<p>A vulnerability exists within the GSSAPI implementation of OpenSSH, potentially affecting Ubuntu Linux systems. According to the BSI advisory published on April 7, 2026, an anonymous remote attacker can exploit this vulnerability. The specifics of the vulnerability are not detailed in the advisory, but successful exploitation could lead to undefined behavior or a denial-of-service condition on the targeted system. This is a significant concern for organizations relying on OpenSSH for secure remote access, as it could disrupt services and impact availability. Further investigation is warranted to understand the root cause and potential mitigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OpenSSH server running on an Ubuntu Linux system with GSSAPI enabled.</li>
<li>Attacker initiates an SSH connection to the target server.</li>
<li>During the GSSAPI authentication exchange, the attacker sends a specially crafted request.</li>
<li>The vulnerable OpenSSH GSSAPI implementation fails to properly handle the malicious request.</li>
<li>The server enters an unstable state due to the unhandled exception or memory corruption.</li>
<li>The OpenSSH process crashes, leading to a denial-of-service.</li>
<li>Repeated exploitation can keep the SSH service unavailable, preventing legitimate users from accessing the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can result in a denial-of-service condition, rendering the affected OpenSSH server unavailable. This can disrupt critical services relying on SSH for remote access and management. The number of potential victims is widespread, affecting any Ubuntu Linux system running a vulnerable version of OpenSSH with GSSAPI enabled. The impact ranges from temporary service outages to prolonged inaccessibility of affected systems, potentially leading to significant operational disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections for unusual SSH traffic patterns, particularly those involving GSSAPI authentication (see the &ldquo;Detect Suspicious SSH GSSAPI Authentication&rdquo; rule).</li>
<li>Review OpenSSH server logs for error messages or crashes occurring during GSSAPI authentication attempts (see the &ldquo;Detect OpenSSH GSSAPI Authentication Failures&rdquo; rule and enable detailed logging).</li>
<li>Investigate any instances of OpenSSH processes crashing or becoming unresponsive, especially after receiving inbound network connections.</li>
<li>Stay informed about future security updates from OpenSSH and Ubuntu Linux that address this vulnerability, and apply them promptly upon release.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>openssh</category><category>gssapi</category><category>denial-of-service</category><category>linux</category></item><item><title>prompts.chat Path Traversal Vulnerability (CVE-2026-22661)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prompts-chat-traversal/</guid><description>A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.</description><content:encoded><![CDATA[<p>prompts.chat, a software application, is vulnerable to a path traversal attack (CVE-2026-22661) in versions prior to commit 0f8d4c3. This vulnerability stems from insufficient server-side validation of filenames within skill file archives. A remote attacker can exploit this by crafting malicious ZIP archives that contain filenames with path traversal sequences (e.g., ../). When a vulnerable prompts.chat instance extracts these archives, the lack of proper sanitization allows the attacker to write files to arbitrary locations on the file system, potentially overwriting critical system files and achieving arbitrary code execution. This poses a significant risk to system integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious ZIP archive containing a specially crafted skill file.</li>
<li>The filenames within the ZIP archive include path traversal sequences such as <code>../</code>.</li>
<li>The attacker uploads the malicious ZIP archive to the prompts.chat application.</li>
<li>prompts.chat processes the uploaded ZIP archive without properly sanitizing the filenames.</li>
<li>The application extracts the contents of the ZIP archive, writing files to locations specified in the malicious filenames.</li>
<li>Path traversal sequences in the filenames allow the attacker to write files outside the intended extraction directory.</li>
<li>The attacker overwrites shell initialization files (e.g., <code>.bashrc</code>, <code>.profile</code>, <code>.bash_profile</code>) or other executable files.</li>
<li>When a user logs in or a new shell is spawned, the overwritten initialization file executes malicious code, granting the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22661 allows an attacker to write arbitrary files to the client system, leading to potential overwrite of sensitive system files and arbitrary code execution. The vulnerability affects systems running vulnerable versions of prompts.chat. The impact includes complete compromise of the system, data theft, and further propagation of malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch by upgrading to commit 0f8d4c3 or later to remediate CVE-2026-22661.</li>
<li>Implement server-side filename validation and sanitization to prevent path traversal attacks when handling ZIP archives within prompts.chat.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in filenames as identified by the provided rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-write</category><category>code-execution</category><category>cve-2026-22661</category><category>prompts.chat</category><category>linux</category></item><item><title>Amazon Athena ODBC Driver OS Command Injection Vulnerability (CVE-2026-5485)</title><link>https://feed.craftedsignal.io/briefs/2026-04-athena-odbc-cmd-injection/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-athena-odbc-cmd-injection/</guid><description>A critical OS command injection vulnerability (CVE-2026-5485) in the Amazon Athena ODBC driver before 2.0.5.1 for Linux allows local attackers to execute arbitrary code via specially crafted connection parameters.</description><content:encoded><![CDATA[<p>CVE-2026-5485 is an OS command injection vulnerability affecting the Amazon Athena ODBC driver before version 2.0.5.1 on Linux systems. The vulnerability resides in the browser-based authentication component of the driver. A local attacker can exploit this flaw by crafting malicious connection parameters that are then processed by the driver during a locally initiated connection attempt. Successful exploitation allows the attacker to execute arbitrary commands on the underlying system with the privileges of the user running the ODBC driver. This poses a significant risk to systems using vulnerable versions of the driver. The vulnerability was published on April 3, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a Linux system with the vulnerable Amazon Athena ODBC driver installed (version before 2.0.5.1).</li>
<li>The attacker crafts specially crafted connection parameters designed to inject OS commands. This could involve manipulating fields expected by the driver to trigger command execution.</li>
<li>The attacker initiates a connection to Amazon Athena using the vulnerable ODBC driver and the crafted connection parameters.</li>
<li>The ODBC driver attempts to authenticate using the browser-based authentication component, loading the malicious connection parameters.</li>
<li>Due to the vulnerability, the crafted parameters are not properly sanitized, leading to OS command injection.</li>
<li>The injected OS commands are executed on the system with the privileges of the user running the ODBC driver.</li>
<li>The attacker can leverage the command execution to install malware, create new user accounts, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5485 allows an attacker to execute arbitrary commands on a vulnerable Linux system. The impact includes potential data theft, system compromise, and lateral movement within the network. Given the nature of command injection, the attacker has significant control over the compromised system, allowing for a wide range of malicious activities. Organizations using the affected Amazon Athena ODBC driver on Linux should prioritize patching to mitigate this risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Amazon Athena ODBC driver to version 2.0.5.1 or later on all Linux systems to remediate CVE-2026-5485.</li>
<li>Monitor process creation events on Linux systems for unusual processes spawned by the ODBC driver using the Sigma rules provided below.</li>
<li>Implement strict access control policies on Linux systems to limit the ability of attackers to leverage local access to exploit the vulnerability.</li>
<li>Enable logging for ODBC driver activity and review logs for suspicious connection attempts.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts by monitoring for command line arguments indicative of command injection.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5485</category><category>command injection</category><category>athena</category><category>odbc</category><category>linux</category></item><item><title>Kubectl Network Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-kubectl-network-modification/</link><pubDate>Wed, 01 Apr 2026 14:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-kubectl-network-modification/</guid><description>This rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.</description><content:encoded><![CDATA[<p>This detection rule identifies potential malicious activity involving the <code>kubectl</code> command-line tool, specifically focusing on modifications to network configurations within Kubernetes environments. The rule monitors for <code>kubectl</code> commands executed with arguments like &ldquo;port-forward&rdquo;, &ldquo;proxy&rdquo;, or &ldquo;expose,&rdquo; which can be used to manipulate network settings. The activity is considered suspicious when initiated from atypical parent processes or directories, such as temporary folders or user home directories. This behavior might indicate an adversary attempting to establish unauthorized access channels or exfiltrate sensitive data. The rule is designed to work with endpoint detection and response (EDR) solutions like Elastic Defend, Crowdstrike, SentinelOne, and cloud workload protection platforms. The rule was last updated on March 30, 2026, and is intended for use in production environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with <code>kubectl</code> installed and configured to interact with a Kubernetes cluster.</li>
<li>The attacker executes the <code>kubectl</code> command with arguments like <code>port-forward</code> to create a local port that forwards traffic to a service or pod within the cluster.</li>
<li>The attacker uses <code>kubectl proxy</code> to create a proxy server that allows them to access the Kubernetes API server from their local machine.</li>
<li>The attacker employs <code>kubectl expose</code> to create a new service that exposes a deployment, replication controller, or pod as a new Kubernetes service, potentially opening up unintended access points.</li>
<li>The attacker may execute these commands from a shell like <code>bash</code>, or from a script located in a temporary directory like <code>/tmp/</code> or <code>/var/tmp/</code>, to evade detection.</li>
<li>The attacker leverages the modified network configurations to establish unauthorized access to sensitive services or data within the Kubernetes cluster.</li>
<li>The attacker may use the proxied or forwarded connections to exfiltrate data from the cluster to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via <code>kubectl</code> network configuration modification can lead to unauthorized access to sensitive data and services within a Kubernetes cluster. This can result in data breaches, service disruptions, and lateral movement within the cluster. The low severity score suggests that while the risk exists, the impact might be limited if proper Kubernetes security best practices are followed. The rule aims to detect these actions early, preventing potential damage to the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Elastic Defend integration or equivalent EDR solutions to monitor process execution and network connections (<code>Data Source: Elastic Defend</code>, <code>Data Source: Crowdstrike</code>, <code>Data Source: SentinelOne</code>).</li>
<li>Deploy the provided Sigma rule to detect suspicious <code>kubectl</code> commands with network-related arguments (<code>rules</code> section). Tune the rule based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process and the command-line arguments of the <code>kubectl</code> command (<code>rules</code> section, <code>Resources: Investigation Guide</code>).</li>
<li>Implement enhanced monitoring and logging for <code>kubectl</code> activities and network configuration changes within the Kubernetes cluster to proactively detect and respond to similar threats in the future (<code>Resources: Investigation Guide</code>).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>kubectl</category><category>kubernetes</category><category>command_and_control</category><category>network_configuration</category><category>linux</category><category>macos</category></item><item><title>BPFDoor Lock File Access</title><link>https://feed.craftedsignal.io/briefs/2024-10-bpfdoor-lockfile-access/</link><pubDate>Wed, 01 Apr 2026 11:18:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-bpfdoor-lockfile-access/</guid><description>BPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.</description><content:encoded><![CDATA[<p>BPFDoor is an evasive Linux backdoor that utilizes extended Berkeley Packet Filter (eBPF) technology to establish stealthy communication channels and maintain persistence on compromised systems. This backdoor has been observed targeting telecom networks, acting as a sleeper cell within the infrastructure. The threat leverages eBPF for its ability to operate at a low level, making detection challenging. This threat brief focuses on detecting BPFDoor through its interaction with common PID and lock files in the <code>/var/run</code> directory, where it attempts to masquerade as legitimate processes or services. The access of these files by unauthorized or unexpected processes can be a strong indicator of BPFDoor activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Linux system, possibly through exploitation of a vulnerability or stolen credentials (not detailed in source).</li>
<li>The attacker deploys the BPFDoor backdoor onto the compromised system.</li>
<li>BPFDoor establishes persistence by injecting itself into the kernel using eBPF.</li>
<li>BPFDoor attempts to blend in with legitimate system activity by accessing or manipulating process ID (.pid) and lock (.lock) files in the <code>/var/run</code> directory.</li>
<li>Specifically, BPFDoor may access files like <code>/var/run/aepmonend.pid</code>, <code>/var/run/auditd.lock</code>, <code>/var/run/cma.lock</code>, <code>/var/run/console-kit.pid</code>, <code>/var/run/consolekit.pid</code>, <code>/var/run/daemon.pid</code>, <code>/var/run/hald-addon.pid</code>, <code>/var/run/hald-smartd.pid</code>, <code>/var/run/haldrund.pid</code>, <code>/var/run/hp-health.pid</code>, <code>/var/run/hpasmlit.lock</code>, <code>/var/run/hpasmlited.pid</code>, <code>/var/run/kdevrund.pid</code>, <code>/var/run/lldpad.lock</code>, <code>/var/run/mcelog.pid</code>, <code>/var/run/system.pid</code>, <code>/var/run/uvp-srv.pid</code>, <code>/var/run/vmtoolagt.pid</code>, and <code>/var/run/xinetd.lock</code>.</li>
<li>This access may involve reading, writing, or modifying these files to conceal its presence.</li>
<li>BPFDoor uses the eBPF-based communication channel to receive commands from a remote attacker.</li>
<li>The attacker executes arbitrary commands on the compromised system, potentially leading to data theft, system disruption, or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful BPFDoor infection can lead to a persistent and stealthy backdoor on a Linux system. Given the nature of eBPF, detection is difficult, potentially allowing attackers long-term access to the system and sensitive data. Telecom networks are specifically mentioned, indicating potential disruption of critical communications infrastructure. The number of victims and specific damage caused varies per deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>BPFDoor Abnormal Process ID or Lock File Accessed</code> to your SIEM to detect suspicious access to lock and PID files in <code>/var/run</code> based on auditd logs.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on identifying the process accessing the lock or PID file and whether it is legitimate.</li>
<li>Implement network monitoring to identify unusual eBPF activity.</li>
<li>Regularly review and update intrusion detection systems (IDS) signatures to include known BPFDoor indicators.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>bpfdoor</category><category>linux</category><category>backdoor</category><category>ebpf</category></item><item><title>Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-05-rhel-libxslt-vuln/</link><pubDate>Wed, 01 Apr 2026 09:20:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-rhel-libxslt-vuln/</guid><description>A local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.</description><content:encoded><![CDATA[<p>A vulnerability exists in the libxslt library within Red Hat Enterprise Linux (RHEL) that could allow a local attacker to perform a denial-of-service (DoS) attack or execute arbitrary code. While specific versions and CVEs are not mentioned in the advisory, the potential impact is significant. This vulnerability could be exploited if a user processes a malicious XSLT stylesheet, leading to memory corruption or other exploitable conditions. This poses a serious risk to systems where libxslt is used to process untrusted or user-supplied XSLT files, potentially allowing for complete system compromise. Defenders should prioritize identifying vulnerable systems and applying patches as soon as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker gains access to the target RHEL system.</li>
<li>The attacker crafts a malicious XSLT stylesheet designed to exploit the libxslt vulnerability.</li>
<li>The attacker leverages a local program that uses libxslt to parse the crafted stylesheet. This could be a custom application or a common utility that relies on libxslt for XSLT processing.</li>
<li>When the vulnerable libxslt library parses the malicious stylesheet, it triggers a buffer overflow or other memory corruption vulnerability.</li>
<li>The memory corruption allows the attacker to overwrite critical system memory or inject malicious code.</li>
<li>If a DoS condition is triggered, the affected service or application crashes, leading to a disruption of service.</li>
<li>If the attacker successfully injects and executes arbitrary code, they gain control of the affected process with the privileges of the user running the application.</li>
<li>The attacker can then leverage their gained access to escalate privileges and perform further malicious activities on the system, such as installing backdoors or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition, causing the affected application or service to crash and become unavailable. More critically, it can allow a local attacker to execute arbitrary code with the privileges of the user running the vulnerable application. This could lead to full system compromise if the affected application runs with elevated privileges. The impact is amplified in environments where libxslt is used to process untrusted or user-supplied XSLT files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify all systems running Red Hat Enterprise Linux that utilize the libxslt library.</li>
<li>Monitor process creations for suspicious child processes spawned by applications utilizing libxslt with the provided Sigma rules.</li>
<li>When available, apply the appropriate patches or updates for libxslt provided by Red Hat to remediate the vulnerability.</li>
<li>Implement strict input validation and sanitization for XSLT stylesheets processed by applications to mitigate the risk of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>libxslt</category><category>rhel</category><category>vulnerability</category><category>code-execution</category><category>denial-of-service</category><category>linux</category></item><item><title>Compromised trivy-action GitHub Action Leads to Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2026-04-trivy-action-compromise/</link><pubDate>Tue, 31 Mar 2026 06:07:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trivy-action-compromise/</guid><description>The trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.</description><content:encoded><![CDATA[<p>On March 19, 2026, CrowdStrike detected a spike in suspicious script executions on Linux-based GitHub Actions runners, which led to the discovery of a supply chain compromise affecting the <code>aquasecurity/trivy-action</code> GitHub Action. This action is a popular open-source vulnerability scanner frequently used in CI/CD pipelines. The attacker retroactively poisoned 76 of the 77 release tags by repointing them to malicious commits. These commits replaced the legitimate entry point with a multi-stage credential stealer. The injected code executes before the original scanner, allowing workflows to complete seemingly normally while secretly exfiltrating sensitive information. Aqua Security has confirmed and removed the malicious artifacts. This incident highlights the risks associated with mutable tags in Git-based workflows and the importance of verifying action integrity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains write access to the <code>aquasecurity/trivy-action</code> repository on GitHub.</li>
<li>The attacker modifies the action&rsquo;s <code>entrypoint.sh</code> script to include malicious code for credential theft. Specifically, the attacker prepends approximately 105 lines of malicious code.</li>
<li>The attacker uses git tag repointing to retroactively poison existing release tags (e.g., <code>@0.24.0</code>) to point to the malicious commit.</li>
<li>Developers&rsquo; CI/CD pipelines reference the compromised <code>trivy-action</code> using a poisoned tag (e.g., <code>aquasecurity/trivy-action@0.24.0</code>).</li>
<li>When a workflow runs, the GitHub Actions runner downloads and executes the malicious <code>entrypoint.sh</code> script, granting it access to the runner&rsquo;s environment, secrets, and network.</li>
<li>The malicious script enumerates running processes to identify potential targets for credential theft.</li>
<li>The malicious code exfiltrates credentials and secrets.</li>
<li>The original <code>trivy</code> scanner is executed, masking the malicious activity and allowing the workflow to complete normally.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the <code>trivy-action</code> GitHub Action allowed attackers to steal credentials and secrets from CI/CD pipelines that used the compromised action. Because the malicious code ran with the full privileges of the runner, it had access to sensitive information such as API keys, deployment tokens, and cloud credentials. The number of affected organizations is unknown, but given the widespread adoption of <code>trivy-action</code>, the potential impact is significant. Successful exploitation can lead to unauthorized access to cloud resources, code repositories, and other sensitive systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect your CI/CD pipeline configurations for usage of the <code>aquasecurity/trivy-action</code> and audit the integrity of the referenced tags against the known good commits, if available from Aqua Security&rsquo;s advisories.</li>
<li>Implement tooling and processes to verify the integrity of third-party GitHub Actions used in CI/CD pipelines.</li>
<li>Monitor process execution on GitHub Actions runners for suspicious activity, such as enumeration of processes or unexpected network connections (see Sigma rule below).</li>
<li>Enable and review process creation logs on CI/CD runner environments to identify anomalous script execution (see Sigma rule below).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>github-actions</category><category>credential-theft</category><category>linux</category></item><item><title>act Project Cache Poisoning Vulnerability Leads to Potential RCE</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-act-cache-rce/</link><pubDate>Tue, 31 Mar 2026 03:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-act-cache-rce/</guid><description>A vulnerability in versions prior to 0.2.86 of the act project allows remote attackers to create arbitrary caches, potentially leading to remote code execution within Docker containers by poisoning predicted cache keys.</description><content:encoded><![CDATA[<p>The <code>act</code> project, designed for local execution of GitHub Actions workflows, contains a critical vulnerability affecting versions prior to 0.2.86. The built-in actions/cache server, intended for local caching, inadvertently listens for connections on all network interfaces. This exposure allows any attacker capable of reaching the server, including those on the internet, to create caches with arbitrary keys and retrieve existing cache data. By predicting the cache keys used by local actions, an attacker can inject malicious content into the cache, paving the way for arbitrary remote code execution within the Docker container used by <code>act</code>. This vulnerability was addressed in version 0.2.86 of <code>act</code>. The CVSS v3.1 base score is 8.2, indicating a high severity threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable <code>act</code> instance running a version prior to 0.2.86 with its cache server exposed on all interfaces.</li>
<li>The attacker probes the exposed <code>act</code> cache server to determine accessible endpoints and version information.</li>
<li>The attacker analyzes common GitHub Actions workflows and identifies predictable cache keys.</li>
<li>The attacker crafts a malicious cache archive containing payloads designed for remote code execution.</li>
<li>The attacker uploads the malicious cache archive to the vulnerable <code>act</code> instance using the predicted cache key.</li>
<li>A legitimate user triggers a local GitHub Actions workflow using <code>act</code>.</li>
<li>The <code>act</code> instance retrieves the attacker&rsquo;s malicious cache archive instead of the expected legitimate cache.</li>
<li>The malicious payload within the cache is executed within the Docker container, leading to remote code execution on the host system running <code>act</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve arbitrary remote code execution on the host system running the vulnerable version of <code>act</code>. This can lead to complete system compromise, data theft, and further lateral movement within the network. The vulnerability affects any user running a version of <code>act</code> prior to 0.2.86 with the cache server exposed. While the number of directly affected users is unknown, the potential impact on development environments and CI/CD pipelines is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to version 0.2.86 or later of the <code>act</code> project to remediate the vulnerability (CVE-2026-34042).</li>
<li>Implement network access controls to restrict access to the <code>act</code> cache server to only trusted networks and hosts.</li>
<li>Monitor network connections to the <code>act</code> cache server for unexpected or unauthorized access.</li>
<li>Enable process monitoring on systems running <code>act</code> to detect potentially malicious processes spawned from Docker containers.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>act</category><category>cache-poisoning</category><category>rce</category><category>github-actions</category><category>linux</category></item><item><title>Multiple Vulnerabilities in NGINX and NGINX Plus</title><link>https://feed.craftedsignal.io/briefs/2026-03-nginx-vulns/</link><pubDate>Mon, 30 Mar 2026 10:14:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-nginx-vulns/</guid><description>Multiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in NGINX and NGINX Plus, potentially allowing attackers to perform a range of malicious activities. These include launching denial-of-service (DoS) attacks to disrupt service availability, manipulating sensitive data, bypassing existing security measures, and, in the worst-case scenario, achieving arbitrary code execution on the affected system. Defenders should be aware that although no specific CVEs or attack campaigns are mentioned, the broad range of potential impacts makes patching and detection critical. The scope of these vulnerabilities extends to any organization utilizing NGINX or NGINX Plus as part of their infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Since the specific vulnerabilities are not detailed, the following attack chain represents a generalized exploitation scenario:</p>
<ol>
<li><strong>Vulnerability Discovery:</strong> The attacker identifies a vulnerable version of NGINX or NGINX Plus through reconnaissance.</li>
<li><strong>Exploit Development/Acquisition:</strong> The attacker develops a custom exploit or obtains one from public or private sources targeting the identified vulnerability (e.g., buffer overflow, integer overflow, or configuration flaw).</li>
<li><strong>Target Selection:</strong> The attacker identifies a vulnerable NGINX instance exposed to the network.</li>
<li><strong>Initial Exploitation:</strong> The attacker sends a specially crafted request to the targeted NGINX server, triggering the vulnerability. This might involve manipulating HTTP headers, crafting specific URL parameters, or exploiting flaws in request handling.</li>
<li><strong>Privilege Escalation (if needed):</strong> Depending on the vulnerability, the attacker may need to escalate privileges to gain full control of the system. This could involve exploiting additional vulnerabilities or misconfigurations.</li>
<li><strong>Data Manipulation/Security Bypass/DoS:</strong> The attacker leverages the exploited vulnerability to manipulate data served by NGINX, bypass authentication or authorization mechanisms, or initiate a denial-of-service attack by consuming excessive resources.</li>
<li><strong>Arbitrary Code Execution (Potential):</strong> If the vulnerability allows, the attacker executes arbitrary code on the NGINX server, potentially installing malware, establishing persistence, or using the compromised server as a pivot point for further attacks.</li>
<li><strong>Lateral Movement/Exfiltration (Potential):</strong> After gaining a foothold, the attacker may attempt to move laterally within the network, compromising other systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant damage. A denial-of-service attack can disrupt critical services, causing financial losses and reputational damage. Data manipulation can compromise the integrity of information served by NGINX, leading to incorrect decisions or further attacks. Bypassing security measures can grant unauthorized access to sensitive resources. Arbitrary code execution allows the attacker to take complete control of the server, potentially leading to data theft, system compromise, and further attacks on internal infrastructure. The exact number of potential victims is unknown, but it could be extensive given the widespread use of NGINX and NGINX Plus.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NGINX and NGINX Plus to the latest patched versions to remediate known vulnerabilities.</li>
<li>Implement the &ldquo;Detect Suspicious Nginx Configuration Changes&rdquo; Sigma rule to detect unauthorized modifications to the Nginx configuration.</li>
<li>Deploy the &ldquo;Detect Nginx DoS Attempts&rdquo; Sigma rule to monitor for suspicious traffic patterns indicative of a denial-of-service attack against Nginx.</li>
<li>Implement strict access controls to limit exposure of NGINX servers to untrusted networks.</li>
<li>Regularly review NGINX configuration files for misconfigurations and security vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>nginx</category><category>vulnerability</category><category>denial-of-service</category><category>code-execution</category><category>webserver</category><category>linux</category></item><item><title>Incus Instance Template Vulnerability CVE-2026-33897</title><link>https://feed.craftedsignal.io/briefs/2024-01-incus-template-vuln/</link><pubDate>Thu, 26 Mar 2026 23:16:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-incus-template-vuln/</guid><description>A vulnerability in Incus versions prior to 6.23.0 allows for arbitrary read and write access as root on the host server by exploiting a missing chroot isolation in the pongo2 template engine.</description><content:encoded>&lt;p>Incus, a system container and virtual machine manager, is vulnerable to arbitrary read and write access as root due to a flaw in its instance template handling. Prior to version 6.23.0, the application lacks proper chroot isolation when processing pongo2 templates. These templates, intended for file templating within instances during their lifecycle, bypass the expected chroot, granting access to the entire host filesystem with root privileges. This vulnerability, identified as CVE-2026-33897…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>incus</category><category>template-injection</category><category>privilege-escalation</category><category>CVE-2026-33897</category><category>linux</category></item><item><title>Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS</title><link>https://feed.craftedsignal.io/briefs/2026-03-rhel-code-execution/</link><pubDate>Wed, 25 Mar 2026 09:51:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-rhel-code-execution/</guid><description>A remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.</description><content:encoded><![CDATA[<p>A vulnerability exists in Red Hat Enterprise Linux, specifically within the 389-ds-base component. This flaw allows a remote, authenticated attacker to execute arbitrary code on the affected system. While the specific nature of the vulnerability isn&rsquo;t detailed, the authentication requirement suggests it likely involves a flaw in how the 389 Directory Server handles authenticated requests. Successful exploitation could lead to complete system compromise, allowing the attacker to install malware, steal sensitive data, or disrupt services. Additionally, the vulnerability has the potential to be leveraged for a denial-of-service (DoS) attack, rendering the system unavailable. Defenders should prioritize patching and monitoring for suspicious activity related to the 389-ds-base service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains valid credentials for the 389 Directory Server, possibly through credential stuffing, phishing, or other means.</li>
<li>The attacker establishes an authenticated connection to the 389 Directory Server (likely over LDAP or LDAPS).</li>
<li>The attacker crafts a malicious request that exploits the vulnerability within 389-ds-base. This request could involve a specially formatted LDAP query or modification operation.</li>
<li>The vulnerable code within 389-ds-base processes the malicious request, leading to arbitrary code execution in the context of the 389 Directory Server process.</li>
<li>The attacker leverages the initial code execution to escalate privileges to root or another privileged account. This could involve exploiting other vulnerabilities or misconfigurations on the system.</li>
<li>The attacker installs malware, backdoors, or other malicious tools on the compromised system.</li>
<li>Alternatively, the attacker triggers a denial-of-service condition, causing the 389 Directory Server to crash or become unresponsive.</li>
<li>The attacker uses the compromised system as a foothold to move laterally within the network, targeting other critical systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow attackers to gain complete control of Red Hat Enterprise Linux systems running the 389 Directory Server. This could lead to data breaches, system outages, and further compromise of the network. The potential for denial-of-service attacks could disrupt critical services and impact business operations. The number of affected systems depends on the prevalence of 389-ds-base deployments within an organization&rsquo;s infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches provided by Red Hat for the 389-ds-base package to remediate the vulnerability.</li>
<li>Deploy the Sigma rules below to your SIEM to detect potential exploitation attempts targeting 389-ds-base.</li>
<li>Monitor authentication logs for the 389 Directory Server for suspicious login attempts or unusual activity.</li>
<li>Review and enforce strong password policies to mitigate the risk of credential compromise.</li>
<li>Implement network segmentation to limit the impact of a potential breach.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rhel</category><category>code-execution</category><category>denial-of-service</category><category>linux</category></item><item><title>Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs</title><link>https://feed.craftedsignal.io/briefs/2026-03-out-of-cancel/</link><pubDate>Wed, 25 Mar 2026 07:30:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-out-of-cancel/</guid><description>The 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.</description><content:encoded><![CDATA[<p>The &lsquo;Out-of-Cancel&rsquo; vulnerability class, discovered and detailed in March 2026, highlights a category of security flaws residing within the workqueue cancellation APIs in the Linux kernel. This vulnerability arises when work items are improperly handled during cancellation, potentially leading to use-after-free conditions, race conditions, and other memory corruption issues. The initial report and analysis were published on March 23, 2026. While specific exploits are not detailed in the source material, the nature of kernel vulnerabilities makes them critical for defenders to address. The impact can range from denial of service to privilege escalation and potentially arbitrary code execution within the kernel context. This vulnerability class affects a broad range of Linux systems, making it a widespread concern.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user-space program triggers a specific kernel function that queues a work item to a workqueue.</li>
<li>The work item is scheduled for execution, but before it begins, the user-space program requests cancellation of the work item via a workqueue cancellation API.</li>
<li>Due to a race condition or improper synchronization, the work item is canceled but not fully removed from the workqueue&rsquo;s internal data structures.</li>
<li>The kernel attempts to access the work item after it has been freed, resulting in a use-after-free vulnerability.</li>
<li>An attacker manipulates memory layout to place controlled data at the memory location of the freed work item.</li>
<li>The kernel code now operates on the attacker-controlled data, leading to memory corruption or information leakage.</li>
<li>The attacker leverages the memory corruption to overwrite critical kernel data structures, such as function pointers or security credentials.</li>
<li>Successful exploitation leads to privilege escalation, allowing the attacker to execute arbitrary code with kernel-level privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The &lsquo;Out-of-Cancel&rsquo; vulnerability class can lead to severe consequences, including kernel crashes (denial of service), privilege escalation, and potentially arbitrary code execution within the kernel. A successful exploit could allow an attacker to gain complete control over the affected system. Due to the ubiquitous nature of the Linux kernel, a wide range of systems are potentially vulnerable, impacting servers, desktops, embedded systems, and mobile devices. While the exact number of vulnerable systems is unknown, the widespread use of affected kernel versions implies a significant potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor kernel logs for errors related to workqueue cancellations to detect potential exploitation attempts. Enable auditd to log kernel function calls related to workqueue management (audit.rules).</li>
<li>Deploy the Sigma rule <code>Detect Potential Use-After-Free in Workqueue Cancellation</code> to identify suspicious kernel events related to workqueue operations.</li>
<li>Investigate any reported kernel panics or crashes, focusing on stack traces that involve workqueue-related functions.</li>
<li>Stay informed about kernel patches and security advisories related to workqueue vulnerabilities and apply them promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>linux</category><category>kernel</category><category>vulnerability</category><category>workqueue</category></item><item><title>GNU libc Vulnerability Allows Local Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-03-gnu-libc-code-execution/</link><pubDate>Tue, 24 Mar 2026 12:40:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-gnu-libc-code-execution/</guid><description>A local attacker can exploit a vulnerability in GNU libc to execute arbitrary program code on Linux systems.</description><content:encoded><![CDATA[<p>A vulnerability exists in the GNU C Library (glibc) that allows a local attacker to execute arbitrary code. The GNU C Library is a fundamental component of the Linux operating system, providing standard functions for programs. This vulnerability, reported on 2026-03-24, could potentially allow an attacker with local access to gain elevated privileges or compromise the system&rsquo;s integrity by injecting and executing malicious code within the context of vulnerable applications utilizing the affected glibc version. Exploitation requires local access to the system, making it crucial to limit unauthorized access and monitor for suspicious activity. Successful exploitation grants the attacker the same privileges as the compromised application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial local access to a Linux system.</li>
<li>The attacker identifies a vulnerable application linked against the affected GNU libc library.</li>
<li>The attacker crafts a malicious input specifically designed to exploit the vulnerability within the glibc library. This could involve manipulating function calls, memory allocation, or other glibc functionalities.</li>
<li>The attacker executes the vulnerable application with the crafted malicious input.</li>
<li>The malicious input triggers the vulnerability within glibc, allowing the attacker to inject arbitrary code into the application&rsquo;s memory space.</li>
<li>The attacker&rsquo;s injected code executes within the context of the vulnerable application, potentially gaining elevated privileges or access to sensitive data.</li>
<li>The attacker leverages the compromised application to further escalate privileges or move laterally within the system.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code, potentially leading to complete system compromise. The attacker gains the privileges of the user running the vulnerable application. The widespread use of glibc across Linux systems makes this vulnerability a significant threat. While the number of victims is unknown, the potential impact is high across various sectors using Linux-based infrastructure. A successful attack can result in data breaches, system instability, and unauthorized access to sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unusual activity indicative of code injection, focusing on processes utilizing glibc functions (Enable process_creation logging).</li>
<li>Deploy the Sigma rule &ldquo;Detect glibc Exploitation via Malicious Input&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Investigate any abnormal behavior or crashes in applications that rely on glibc.</li>
<li>Implement strict access control policies to limit unauthorized local access to systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>glibc</category><category>code-execution</category><category>linux</category></item><item><title>Unauthenticated CLI Escape Vulnerability (CVE-2026-3587)</title><link>https://feed.craftedsignal.io/briefs/2026-03-cli-escape/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cli-escape/</guid><description>An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface of a device, leading to full compromise and root access on the underlying Linux-based OS, as described in CVE-2026-3587.</description><content:encoded>&lt;p>CVE-2026-3587 describes a critical vulnerability affecting devices with a command-line interface (CLI). An unauthenticated remote attacker can exploit a hidden function within the CLI prompt to bypass intended restrictions and gain unauthorized access. This vulnerability allows the attacker to escape the restricted CLI environment and obtain root privileges on the underlying Linux-based operating system, leading to a complete system compromise. The vulnerability was reported by CERT VDE. A…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>cli</category><category>privilege_escalation</category><category>linux</category></item><item><title>Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-03-rhel-libxslt-vuln/</link><pubDate>Tue, 24 Mar 2026 10:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-rhel-libxslt-vuln/</guid><description>A local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.</description><content:encoded><![CDATA[<p>A vulnerability exists within the libxslt library in Red Hat Enterprise Linux (RHEL) that could be exploited by a local attacker. While specific details regarding the vulnerability (CVE number, affected versions) are not provided in this advisory, the potential impact includes arbitrary code execution or manipulation of files on the affected system. Due to the lack of specific details, the scope of targeting remains unknown, but any RHEL system utilizing libxslt is potentially vulnerable. It is imperative that detection engineers address this threat by implementing proactive measures to identify and mitigate potential exploitation attempts, particularly focusing on detecting unexpected behavior associated with libxslt processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a Red Hat Enterprise Linux system. This could be achieved through various means, such as compromising a user account or exploiting a separate vulnerability to gain initial access.</li>
<li>The attacker crafts a malicious XSLT stylesheet specifically designed to exploit the libxslt vulnerability. This stylesheet could contain code intended for execution or file manipulation.</li>
<li>The attacker utilizes a program or script that leverages libxslt to process the crafted malicious stylesheet. This could involve using command-line tools or applications that rely on libxslt for XML transformations.</li>
<li>During the processing of the malicious stylesheet, the libxslt vulnerability is triggered, leading to the execution of arbitrary code within the context of the application using libxslt.</li>
<li>The attacker leverages the code execution to escalate privileges on the system, potentially gaining root access.</li>
<li>Alternatively, the attacker uses the vulnerability to manipulate files on the system, modifying configurations, injecting malicious code into existing files, or exfiltrating sensitive data.</li>
<li>The attacker maintains persistence on the compromised system, ensuring continued access and control.</li>
<li>The attacker achieves their objective, which could be data theft, system disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow a local attacker to gain complete control over the affected Red Hat Enterprise Linux system. This may lead to data breaches, system outages, or the installation of backdoors for persistent access. Given the widespread use of RHEL in enterprise environments, a successful attack could have significant consequences across various sectors. The potential for arbitrary code execution and file manipulation makes this a high-severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for unexpected or unusual activity involving libxslt binaries using the provided Sigma rule <code>Detect Suspicious Libxslt Process Execution</code>.</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to critical system files using the Sigma rule <code>Detect Malicious File Modification via Libxslt</code>.</li>
<li>Regularly audit user privileges and access controls to minimize the potential impact of a successful exploit.</li>
<li>Investigate and remediate any identified instances of potentially malicious XSLT stylesheets being processed on RHEL systems.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libxslt</category><category>rhel</category><category>code-execution</category><category>file-manipulation</category><category>linux</category></item><item><title>Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)</title><link>https://feed.craftedsignal.io/briefs/2026-03-xenstore-crash/</link><pubDate>Mon, 23 Mar 2026 07:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-xenstore-crash/</guid><description>A guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.</description><content:encoded>&lt;p>CVE-2026-23555 details a vulnerability within the Xenstore component of the Xen hypervisor. A malicious or compromised guest virtual machine (VM) can trigger this vulnerability by issuing a Xenstore command that attempts to access a specific, illegal node path: &lt;code>/local/domain/&lt;/code>. This improper node path verification leads to a clobbered error indicator within the xenstored process, ultimately causing it to crash due to a failing assert() statement.&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xen</category><category>xenstore</category><category>denial-of-service</category><category>CVE-2026-23555</category><category>hypervisor</category><category>vulnerability</category><category>linux</category></item><item><title>Inner Warden Security Agent Capabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-inner-warden/</link><pubDate>Sun, 22 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-inner-warden/</guid><description>The open-source Inner Warden project is a security agent leveraging eBPF for kernel-level monitoring and autonomous response actions like IP blocking and process termination, aiming to create a distributed security mesh.</description><content:encoded><![CDATA[<p>Inner Warden is an open-source security agent designed to enhance server protection by utilizing eBPF for kernel-level monitoring. The project aims to provide autonomous response capabilities, initially developed to protect an AI agent (OpenClaw). Inner Warden uses eBPF tracepoints (execve, connect, openat), kprobes on commit_creds for detecting privilege escalation, LSM hooks to block execution from /tmp and /dev/shm, and XDP for high-speed IP blocking. It incorporates a detection layer for brute force attacks, port scans, privilege escalations, container escapes, and C2 callbacks. The response layer includes blocking IPs, killing processes, restricting sudo access, and deploying simple honeypots. A distributed mesh architecture allows nodes to share signals about suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through an unspecified vulnerability.</li>
<li>The attacker attempts to execute a malicious binary from <code>/tmp</code> or <code>/dev/shm</code>.</li>
<li>Inner Warden&rsquo;s LSM hook blocks the execution of the binary, preventing the initial execution attempt.</li>
<li>The attacker attempts to escalate privileges by exploiting a vulnerability, triggering the <code>commit_creds</code> kprobe.</li>
<li>Inner Warden detects the privilege escalation attempt.</li>
<li>The attacker attempts to establish a command-and-control (C2) connection.</li>
<li>Inner Warden detects the C2 callback and blocks the attacker&rsquo;s IP address using XDP, preventing further communication.</li>
<li>Inner Warden nodes share signals of the suspicious activity, prompting other nodes within the mesh to adjust their behavior, increasing security across the distributed environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deployment of Inner Warden could prevent privilege escalation attacks, block execution of malicious code from temporary directories, disrupt command-and-control communication, and mitigate brute force and port scanning attempts. A compromised node could potentially send false positives, but Inner Warden&rsquo;s trust scoring is designed to avoid large-scale disruption. The primary impact is improved host security posture and potentially reduced incident response workload through automated threat mitigation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the process creation rule below to detect executions blocked by Inner Warden&rsquo;s LSM hook from <code>/tmp</code> or <code>/dev/shm</code>.</li>
<li>Deploy the network connection rule to identify C2 callbacks blocked by Inner Warden&rsquo;s XDP-based IP blocking.</li>
<li>Investigate any alerts generated by the privilege escalation detection rule, indicating potential exploitation attempts.</li>
<li>Monitor for alerts generated by Inner Warden regarding potential poisoning or false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ebpf</category><category>security-agent</category><category>autonomous-response</category><category>privilege-escalation</category><category>c2-blocking</category><category>linux</category></item><item><title>Potential snap-confine Privilege Escalation via CVE-2026-3888</title><link>https://feed.craftedsignal.io/briefs/2026-03-snap-confine-lpe/</link><pubDate>Fri, 20 Mar 2026 08:34:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-snap-confine-lpe/</guid><description>An unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.</description><content:encoded>&lt;p>CVE-2026-3888 is a local privilege escalation vulnerability affecting Ubuntu systems using snap-confine. The vulnerability exists because systemd-tmpfiles may delete the /tmp/.snap directory, which is normally created by root. An unprivileged user can then recreate this directory and populate it with attacker-controlled files. The snap-confine utility, during subsequent snap sandbox initialization, may then bind-mount or trust these attacker-controlled paths. This can lead to the manipulation…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>cve-2026-3888</category></item><item><title>Persistnux - Linux Persistence Detection Tool</title><link>https://feed.craftedsignal.io/briefs/2026-03-persistnux-tool/</link><pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-persistnux-tool/</guid><description>Persistnux is a bash-based tool designed to identify known Linux persistence mechanisms used by attackers to maintain access to compromised systems, generating detailed reports for DFIR analysis.</description><content:encoded><![CDATA[<p>Persistnux is a bash-based tool designed to aid security analysts and incident responders in identifying Linux persistence mechanisms employed by attackers. Developed by 0xblake, this tool streamlines the process of detecting various persistence techniques on compromised Linux systems. Persistnux performs comprehensive checks across the system, generating detailed reports in both CSV and JSONL formats for further analysis. Its key feature is its dependency-free operation, relying solely on built-in Linux tools, making it easily deployable on live systems. The tool focuses on detecting known methods used to maintain access, offering a valuable resource for defenders. It uses indicators and confidence scoring to highlight suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a Linux system through methods such as exploiting vulnerabilities or using stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> Once inside, the attacker attempts to escalate privileges to gain root access using exploits or misconfigurations.</li>
<li><strong>Persistence Establishment:</strong> The attacker employs various Linux persistence mechanisms to ensure continued access to the compromised system. These techniques include manipulating init scripts, cron jobs, and systemd services.</li>
<li><strong>Init Script Modification:</strong> The attacker modifies init scripts located in <code>/etc/init.d/</code> or <code>/etc/rc.d/</code> to execute malicious code during system startup.</li>
<li><strong>Cron Job Manipulation:</strong> The attacker schedules malicious tasks using cron jobs by adding entries to <code>/etc/crontab</code> or user-specific crontab files.</li>
<li><strong>Systemd Service Modification:</strong> The attacker creates or modifies systemd service files in <code>/etc/systemd/system/</code> to execute malicious code as a service.</li>
<li><strong>Reverse Shell Installation:</strong> The attacker installs a reverse shell to maintain persistent access by connecting back to an attacker-controlled server. This may involve techniques like download-execute or obfuscation.</li>
<li><strong>Data Exfiltration/Malicious Activity:</strong> With persistent access established, the attacker proceeds to exfiltrate sensitive data, deploy ransomware, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and persistence within a Linux environment can allow attackers to maintain long-term access, leading to data theft, system disruption, or the deployment of ransomware. The impact can range from data breaches and financial losses to reputational damage and operational downtime. The scope of impact depends on the level of access gained and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for detecting init script modifications to identify potential persistence attempts (reference: Sigma rule for init script modification).</li>
<li>Deploy the Sigma rule for detecting cron job modifications to identify potential persistence attempts (reference: Sigma rule for cron job modification).</li>
<li>Regularly audit systemd service configurations for unauthorized modifications using the Sigma rule (reference: Sigma rule for systemd service modification).</li>
<li>Use Persistnux or similar tools to regularly scan systems for known persistence mechanisms and review the generated reports (reference: Persistnux tool).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>linux</category><category>dfir</category></item><item><title>CrackArmor: AppArmor Flaws Enable Local Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-03-crackarmor-lpe/</link><pubDate>Tue, 17 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-crackarmor-lpe/</guid><description>Qualys discovered critical vulnerabilities in AppArmor, enabling local privilege escalation to root on vulnerable Linux systems.</description><content:encoded><![CDATA[<p>In March 2026, Qualys disclosed a set of critical vulnerabilities collectively named &ldquo;CrackArmor&rdquo; affecting AppArmor, a Linux kernel security module. These flaws allow a local attacker to escalate privileges to root. While specific CVEs were not detailed in the initial Reddit post, the Qualys blog (linked in the source) will likely contain them. The vulnerabilities stem from weaknesses in AppArmor&rsquo;s parsing and enforcement mechanisms, allowing for crafted AppArmor profiles or interactions with existing profiles to bypass security restrictions. This poses a significant risk to any Linux system using AppArmor for security, potentially leading to complete system compromise. Defenders need to investigate patching and workarounds immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to a vulnerable Linux system.</li>
<li>Attacker crafts a malicious AppArmor profile or modifies an existing one to exploit parsing vulnerabilities. This could involve exploiting weaknesses in how AppArmor handles specific characters, escape sequences, or profile directives.</li>
<li>The attacker loads the crafted profile using <code>apparmor_parser</code> or a similar tool.</li>
<li>The vulnerable AppArmor implementation fails to correctly parse the profile, leading to a bypass of security restrictions.</li>
<li>Attacker executes a program or script that would normally be blocked by AppArmor under a correctly enforced profile.</li>
<li>Due to the bypassed restrictions, the attacker gains access to resources or capabilities normally restricted to the root user.</li>
<li>Attacker leverages these elevated privileges to execute arbitrary commands as root.</li>
<li>The attacker achieves full system compromise, including data exfiltration, installation of malware, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a local, unprivileged attacker to gain complete control over a vulnerable Linux system. This can lead to data breaches, system downtime, and the installation of persistent backdoors. The scope of impact depends on the prevalence of vulnerable AppArmor versions in different Linux distributions. Systems relying on AppArmor for security isolation are particularly at risk, potentially undermining container security or application sandboxing.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Consult the Qualys blog post (linked in references) for specific CVE identifiers and patch information as soon as it is released.</li>
<li>Apply patches for AppArmor as soon as they become available from your Linux distribution vendor.</li>
<li>Monitor system logs for suspicious use of <code>apparmor_parser</code> and other AppArmor utilities.</li>
<li>Audit existing AppArmor profiles for potential vulnerabilities and misconfigurations.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apparmor</category><category>privilege-escalation</category><category>linux</category></item><item><title>Linux Shell Invocation via Env Command</title><link>https://feed.craftedsignal.io/briefs/2024-10-env-shell-invocation/</link><pubDate>Sat, 26 Oct 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-env-shell-invocation/</guid><description>The 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.</description><content:encoded><![CDATA[<p>The &rsquo;env&rsquo; command in Linux is typically used to run a program in a modified environment without altering the existing environment variables. However, attackers can abuse this command to invoke a shell directly, potentially bypassing restricted environments. This is often a technique used for privilege escalation or executing arbitrary commands in situations where direct shell access is limited. This activity matters for defenders because it can indicate an attacker attempting to gain…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>execution</category><category>linux</category></item><item><title>Curl or Wget Execution from Container Context</title><link>https://feed.craftedsignal.io/briefs/2024-01-curl-wget-container-execution/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-curl-wget-container-execution/</guid><description>This rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of <code>curl</code> or <code>wget</code> being executed from within containers managed by <code>runc</code> on Linux systems. The rule leverages Auditd Manager to monitor system calls and flags processes running with the title <code>runc init</code> that then execute <code>curl</code> or <code>wget</code>. This activity is noteworthy because attackers often use these tools to download malicious payloads (stagers, scripts, implants) or to exfiltrate data after compromising a container. While these tools can be used legitimately within containers, their execution in the context of <code>runc init</code> suggests a higher risk of malicious activity. The rule focuses on narrowing the signal to the container runtime boundary where unexpected download clients are more worthy of review. The rule specifically leverages Auditd Manager for data collection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a host system, possibly through exploiting a vulnerability in an application running outside the container (e.g., web application).</li>
<li>The attacker identifies a containerized application running on the compromised host.</li>
<li>The attacker exploits a vulnerability within the container, or abuses a privileged workload within the container, to gain elevated privileges or code execution within the container.</li>
<li>The attacker uses <code>curl</code> or <code>wget</code> to download additional tools or scripts into the container. These tools might include reverse shells, credential dumping tools, or data exfiltration utilities.</li>
<li>The attacker executes the downloaded tools to further compromise the container or the underlying host.</li>
<li>The attacker uses <code>curl</code> or <code>wget</code> to stage data for exfiltration to an external server. This may involve compressing and encoding data before transmission.</li>
<li>The attacker initiates the data exfiltration process using <code>curl</code> or <code>wget</code> to send the staged data to a remote server controlled by the attacker.</li>
<li>The attacker achieves their final objective, which could include data theft, system disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised containers can lead to data breaches, service disruptions, and further attacks on internal systems. Successful exploitation could allow attackers to steal sensitive data, install malware, or pivot to other parts of the network, impacting confidentiality, integrity, and availability. The number of affected systems depends on the scope of the container deployment and the privileges granted to the compromised container.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Curl or Wget Execution from Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable Auditd Manager with syscall coverage including <code>execve</code> to capture process execution and arguments within containers, as mentioned in the rule&rsquo;s setup instructions.</li>
<li>Correlate alerts from this rule with network logs to identify the destination IP addresses and domains contacted by the compromised container.</li>
<li>Baseline trusted images and exclude stable image digests or namespaces when noisy to reduce false positives, as suggested in the rule&rsquo;s false positives section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>container</category><category>auditd</category><category>linux</category></item><item><title>Uncommon Destination Port Connection by Web Server on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</link><pubDate>Tue, 09 Jan 2024 18:28:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</guid><description>The rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying potentially malicious activity stemming from Linux-based web servers. The rule is triggered when a web server process, such as Apache, Nginx, or others, initiates an outbound network connection to a destination port that is considered non-standard. This activity can signal the presence of a web shell, a malicious script uploaded to a web server to enable remote access and control. Attackers may exploit compromised web servers to establish covert communication channels, exfiltrate data, or launch further attacks on internal systems. The rule leverages data from Elastic Defend to monitor network connections and filter out legitimate traffic based on a predefined list of common ports and internal IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via exploitation of a vulnerability in a web application or web server component running on a Linux system (e.g., through SQL injection or remote code execution).</li>
<li>A web shell is uploaded to the compromised web server, often disguised as a legitimate file or hidden within existing directories.</li>
<li>The attacker interacts with the web shell through HTTP requests, using it as a command and control interface.</li>
<li>The web shell executes commands on the server, initiating outbound network connections to non-standard ports.</li>
<li>These connections may be used to communicate with external C2 servers, download additional payloads, or exfiltrate sensitive data.</li>
<li>The attacker uses the web shell to move laterally within the network, targeting other systems and services.</li>
<li>The attacker attempts to establish persistence on the compromised server, ensuring continued access even after system reboots.</li>
<li>The final objective is data theft, system compromise, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised web servers can lead to significant data breaches, system downtime, and reputational damage. While this rule triggers on low-severity behavior, successful exploitation can lead to complete system compromise. The number of affected systems depends on the scope of the initial vulnerability and the attacker&rsquo;s ability to move laterally. Organizations in all sectors that rely on web-based applications are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect web server processes initiating connections to unusual destination ports and tune for your environment.</li>
<li>Enable Elastic Defend integration to collect the necessary network event data from Linux endpoints to activate the rule.</li>
<li>Review and customize the list of excluded destination ports and internal IP ranges in the Sigma rule to match your organization&rsquo;s specific network configuration and legitimate traffic patterns.</li>
<li>Investigate any alerts generated by the rule to determine if the activity is malicious or benign, focusing on the process name, user, destination IP, and destination port.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>command-and-control</category><category>web shell</category><category>linux</category></item><item><title>Linux Log Clearing Attempts via Common Utilities</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-linux-log-clearing/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-linux-log-clearing/</guid><description>Adversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.</description><content:encoded><![CDATA[<p>Attackers often remove or modify system logs to hide their actions and hinder forensic investigations. This activity involves the use of common Linux utilities to delete or overwrite log files, making it difficult to trace the attacker&rsquo;s entry point, lateral movement, and actions performed on the system. Log clearing is a common post-exploitation technique used by a wide range of threat actors across various campaigns. This brief focuses on detecting the usage of common utilities like <code>rm</code>…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>log-clearing</category><category>linux</category></item><item><title>Potential Privilege Escalation in Container via Runc Init</title><link>https://feed.craftedsignal.io/briefs/2024-01-runc-privilege-escalation/</link><pubDate>Fri, 05 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-runc-privilege-escalation/</guid><description>Detection of runc init child processes with root effective user and non-root login user ID, indicating potential container privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies a potential privilege escalation vulnerability within container environments utilizing <code>runc</code>, the low-level container runtime used by Docker and containerd. The rule focuses on audit events triggered by <code>runc init</code> child processes. Specifically, it flags instances where the effective user ID is root (0), while the login user ID is not root. This discrepancy can indicate malicious activity, such as exploiting credential separation or namespace transitions to gain unauthorized root privileges within the container or escape to the host. This is relevant for defenders because a compromised container can lead to host compromise, data exfiltration, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a container with limited privileges.</li>
<li>The attacker exploits a vulnerability within the container to execute code as the <code>runc init</code> process.</li>
<li>The <code>runc init</code> process spawns a child process while retaining a non-root user ID in audit telemetry.</li>
<li>The child process is assigned an effective user ID of 0 (root), bypassing normal permission controls.</li>
<li>The attacker leverages the elevated privileges to modify sensitive files or execute commands as root within the container&rsquo;s namespace.</li>
<li>The attacker may then attempt to escape the container by exploiting kernel vulnerabilities or misconfigurations to gain access to the host system.</li>
<li>Upon gaining access to the host system, the attacker can install malware, steal sensitive data, or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack within a container environment can lead to complete compromise of the container and potentially the host system. This can result in data breaches, service disruptions, and unauthorized access to sensitive resources. The impact is significant because a single compromised container can become a launchpad for attacks against other containers or the underlying infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Privilege Escalation via Runc Init&rdquo; to your SIEM to detect suspicious <code>runc init</code> process executions.</li>
<li>Enable Linux audit logging via the Auditd Manager integration, ensuring that <code>execve</code> and identity-related fields are captured.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the full audit event details, including process ancestry, user IDs, and container metadata.</li>
<li>Review container configurations and security profiles to identify potential misconfigurations that could facilitate privilege escalation.</li>
<li>Implement network segmentation to limit the blast radius of a compromised container.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>linux</category></item><item><title>High Command Line Entropy Detected for Privileged Commands on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-command-line-entropy/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-command-line-entropy/</guid><description>A machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.</description><content:encoded><![CDATA[<p>This alert originates from a machine learning job designed to detect anomalous command-line activity on Linux systems. Specifically, it focuses on identifying instances where privileged commands are executed with unusually high entropy. High entropy in command lines often signifies obfuscation, which threat actors use to mask their activities and evade detection. This rule leverages the Privileged Access Detection (PAD) integration from Elastic to identify these anomalies. The PAD integration requires Linux logs collected by Elastic Defend or Sysmon Linux. The detection logic analyzes command lines associated with privileged commands, flagging those with a high degree of randomness or complexity. This can indicate unauthorized use of valid accounts (T1078) or attempts at privilege escalation, especially if combined with defense evasion techniques (T1027) such as obfuscating commands. The rule and associated ML job have been in production since Feb 2025 and require Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through a compromised account or vulnerability exploitation.</li>
<li>The attacker identifies privileged commands they need to execute to achieve their objectives, such as gaining root access or modifying sensitive files.</li>
<li>To evade detection, the attacker obfuscates their commands using techniques like encoding, compression, or complex string manipulation.</li>
<li>The attacker executes the obfuscated privileged commands via the command line.</li>
<li>Elastic Defend or Sysmon Linux captures the command-line activity and logs it to Elasticsearch.</li>
<li>The Privileged Access Detection ML job analyzes the command lines and calculates their entropy.</li>
<li>If the entropy exceeds a predefined threshold, the ML job flags the activity as anomalous and generates an alert.</li>
<li>Security analysts investigate the alert to determine the nature of the suspicious activity and take appropriate action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation can grant an attacker complete control over a Linux system, allowing them to steal sensitive data, install malware, or disrupt critical services. While this rule itself triggers on unusual command line activity, the underlying behavior could lead to a full system compromise. The number of potential victims is directly related to the scope of the Linux environment being monitored. Sectors commonly targeted by privilege escalation attacks include technology, finance, and government.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Privileged Access Detection integration and ensure that Linux logs from Elastic Defend or Sysmon Linux are being ingested (Setup section).</li>
<li>Review and tune the machine learning job <code>pad_linux_high_median_process_command_line_entropy_by_user_ea</code> to minimize false positives based on your environment (False positive analysis section in rule).</li>
<li>Create a case management workflow triggered by the &ldquo;High Command Line Entropy Detected for Privileged Commands&rdquo; rule to ensure alerts are promptly investigated.</li>
<li>Implement the remediation steps outlined in the investigation guide to contain and eradicate any confirmed malicious activity (Response and remediation section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>machine-learning</category><category>linux</category></item><item><title>Suspicious Modification of Sensitive Linux Files</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-file-modification/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-file-modification/</guid><description>This threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.</description><content:encoded>&lt;p>Attackers often target sensitive and critical files on Linux systems to maintain persistence, escalate privileges, or disrupt system operations. These files include system configuration files, authentication files, and critical application files. Monitoring changes to these files is crucial for detecting malicious activity. This brief focuses on identifying suspicious process executions that could indicate unauthorized modification of sensitive files. The detection strategy covers processes…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>file-integrity</category><category>privilege-escalation</category><category>persistence</category><category>linux</category></item><item><title>Nsenter to PID Namespace via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-nsenter-pid-namespace/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-nsenter-pid-namespace/</guid><description>This rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.</description><content:encoded><![CDATA[<p>This detection identifies instances where the <code>nsenter</code> command is used to enter a process namespace, specifically targeting a PID. This technique is often employed to attach to the host&rsquo;s init namespace from a container or session, effectively allowing the attacker to execute commands within the host&rsquo;s context. This behavior is concerning because it can be used to escalate privileges and gain unauthorized access to the underlying system. This is especially relevant in containerized environments where attackers may attempt to escape the container and access the host system. The rule leverages Auditd logs to identify these <code>nsenter</code> executions, focusing on those that include the <code>--target</code> or <code>-t</code> flags, which specify the target PID for namespace entry.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container or a restricted session on a Linux host.</li>
<li>The attacker identifies a target PID, often the init process (PID 1), to enter its namespace.</li>
<li>The attacker executes the <code>nsenter</code> command with the <code>--target</code> or <code>-t</code> flag, specifying the target PID. Additional namespace flags like <code>--mount</code>, <code>--uts</code>, <code>--ipc</code>, <code>--net</code>, and <code>--user</code> may also be used.</li>
<li>Auditd logs the <code>nsenter</code> execution, capturing the process name, arguments, and other relevant metadata.</li>
<li>The detection rule identifies the <code>nsenter</code> execution based on the command name and the presence of the <code>--target</code> or <code>-t</code> flag.</li>
<li>The attacker, now within the target PID&rsquo;s namespace, executes commands with the privileges of that process. This may include reading sensitive files, modifying system configurations, or executing malicious code.</li>
<li>The attacker leverages the escalated privileges to further compromise the host system, potentially gaining root access or deploying malware.</li>
<li>The attacker establishes persistence mechanisms to maintain access to the compromised host, such as creating new systemd units or modifying existing ones.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete compromise of the host system. Attackers can gain root privileges, access sensitive data, and deploy malware. In containerized environments, this can allow attackers to escape the container and access the underlying host, potentially affecting other containers running on the same host. The impact is especially significant in production environments where compromised hosts can disrupt critical services and expose sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Auditd Manager integration on Linux hosts to collect process execution telemetry, as specified in the <a href="#setup">setup instructions</a>.</li>
<li>Implement the Sigma rule &ldquo;Nsenter to PID Namespace via Auditd&rdquo; to detect suspicious <code>nsenter</code> executions.</li>
<li>Tune the Sigma rule by excluding known false positives, such as legitimate <code>nsenter</code> executions by platform engineers or CNI/snap workflows, as mentioned in the <a href="#false-positive-analysis">false positives section</a>.</li>
<li>Investigate any detected <code>nsenter</code> executions by reviewing process arguments, parent processes, user identities, and host information, as outlined in the <a href="#triage-and-analysis">triage and analysis section</a>.</li>
<li>Isolate any compromised hosts, revoke credentials, inspect for persistence, and re-image if integrity cannot be proven, as recommended in the <a href="#response-and-remediation">response and remediation section</a>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>container</category></item><item><title>Linux Cron File Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-linux-cron-persistence/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-linux-cron-persistence/</guid><description>An attacker may create new cron files in cron directories to establish persistence on a Linux system, potentially leading to privilege escalation and arbitrary code execution.</description><content:encoded><![CDATA[<p>Attackers can leverage cron jobs to schedule malicious tasks for persistence, privilege escalation, and execution of arbitrary code on compromised Linux systems. This involves creating or modifying cron files in specific directories such as <code>/etc/cron.d/</code>, <code>/etc/cron.daily/</code>, <code>/var/spool/cron/crontabs/</code>, and others. The creation of unexpected cron files by non-administrative users or during suspicious timeframes warrants investigation. While not all cron file creations are malicious, the potential for abuse necessitates monitoring for anomalous activity. Detecting the creation of new cron files can help identify potential persistence mechanisms being deployed by malicious actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker identifies cron job directories, such as <code>/etc/cron.d/</code> or <code>/var/spool/cron/crontabs/</code>.</li>
<li>The attacker creates a new cron file within one of these directories.</li>
<li>The cron file contains malicious commands or scripts designed to execute at a specific time or interval. This could include commands to download and execute malware or establish a reverse shell.</li>
<li>The cron daemon automatically executes the commands specified in the newly created cron file according to the defined schedule.</li>
<li>The attacker gains persistent access to the system, allowing them to maintain control even after reboots.</li>
<li>The attacker may escalate privileges by scheduling commands that run with elevated permissions.</li>
<li>The attacker uses the persistent access to perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can grant attackers persistent access to compromised Linux systems, potentially leading to privilege escalation and unauthorized execution of arbitrary code. This can lead to data breaches, system compromise, and disruption of services. The impact is magnified if the compromised system has access to sensitive information or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect New Cron File Creation&rdquo; to your SIEM to detect the creation of cron files in cron directories and tune for your environment.</li>
<li>Monitor file creation events in cron directories such as <code>/etc/cron.d/</code>, <code>/etc/cron.daily/</code>, <code>/etc/cron.hourly/</code>, <code>/etc/cron.monthly/</code>, <code>/etc/cron.weekly/</code>, <code>/var/spool/cron/crontabs/</code>, and <code>/var/spool/cron/root</code> using file_event logs.</li>
<li>Baseline normal cron file creation activity and apply additional filters to reduce false positives based on the specific environment, as mentioned in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>linux</category></item><item><title>Kubelet API Connection Attempt to Internal IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubelet-api-connection/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubelet-api-connection/</guid><description>The rule detects network connection attempts to the Kubernetes Kubelet API ports 10250 and 10255 on internal IP ranges from Linux hosts, indicating potential lateral movement within container and cluster environments.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious network connections to the Kubernetes Kubelet API, specifically targeting ports 10250 and 10255, from Linux hosts within internal network ranges. Attackers frequently exploit weak authentication or network controls to access the Kubelet API, potentially enabling them to enumerate pods, retrieve logs, and execute commands on nodes. This activity often originates from common scripting utilities like <code>curl</code>, <code>wget</code>, or interpreters like <code>python</code> and <code>node</code>, particularly when executed from world-writable directories such as <code>/tmp</code>, <code>/var/tmp</code>, or <code>/dev/shm</code>. This technique is often a component of container and cluster lateral movement, where the attacker seeks to expand their access within the Kubernetes environment. The rule is designed to detect these unauthorized attempts and alert security teams to investigate potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised container or host within the Kubernetes cluster, potentially through exploiting a vulnerability in a running application.</li>
<li>The attacker executes a reconnaissance command, such as <code>curl</code> or <code>wget</code>, from within the compromised container, targeting the Kubelet API on port 10250 or 10255.</li>
<li>The <code>curl</code> or <code>wget</code> command is executed from a temporary directory like <code>/tmp</code> or <code>/dev/shm</code> to avoid detection.</li>
<li>The attacker attempts to enumerate running pods and services by querying the <code>/pods</code> or <code>/runningpods</code> endpoints of the Kubelet API.</li>
<li>If successful, the attacker identifies a target pod within the cluster based on the enumerated information.</li>
<li>The attacker leverages the Kubelet API to execute commands within the target pod, potentially escalating privileges or accessing sensitive data.</li>
<li>The attacker attempts to move laterally to other nodes or containers within the Kubernetes cluster, repeating the reconnaissance and exploitation steps.</li>
<li>The ultimate goal is to gain control over the entire Kubernetes cluster, enabling data exfiltration, resource hijacking, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the Kubelet API can lead to a complete compromise of the Kubernetes cluster. Attackers can gain unauthorized access to sensitive data, escalate privileges, and disrupt critical services. While the number of victims may vary depending on the organization&rsquo;s security posture, a successful attack could impact all applications and data managed by the cluster. Organizations in any sector utilizing Kubernetes are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable syscall auditing and ensure that <code>event.category:network</code> events are generated for network connections, as outlined in the rule&rsquo;s setup guide.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune it based on your environment to reduce false positives.</li>
<li>Restrict pod-to-node access to port 10250 using network policies or security groups to limit the attack surface, as noted in the rule&rsquo;s documentation.</li>
<li>Implement Kubernetes API audit logging to detect unauthorized access attempts and credential access, correlating with process argument telemetry as mentioned in the triage steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>lateral-movement</category><category>kubelet</category><category>linux</category><category>container</category></item><item><title>Unusual Process Connecting to Docker or Containerd Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</guid><description>An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.</description><content:encoded><![CDATA[<p>This threat involves unauthorized processes connecting directly to container runtime sockets (Docker or Containerd) on Linux systems. This bypasses Kubernetes API server restrictions, potentially allowing attackers to create, execute, or manipulate containers without proper authorization or logging. The risk lies in attackers circumventing RBAC, admission webhooks, and pod security standards. The attack can start when a compromised process attempts to connect to the Docker or Containerd socket, potentially leading to privilege escalation and lateral movement within the containerized environment. This attack is significant because it undermines core security controls within container orchestration platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious or compromised process gains initial access to the host system.</li>
<li>The process attempts to connect to the container runtime socket (e.g., <code>/var/run/docker.sock</code> or <code>/run/containerd/containerd.sock</code>).</li>
<li>The process bypasses the Kubernetes API server and associated security controls.</li>
<li>The attacker exploits the direct socket connection to create a new container.</li>
<li>The attacker gains access to sensitive data or resources within the container.</li>
<li>The attacker escalates privileges within the compromised container.</li>
<li>The attacker uses the compromised container to move laterally to other containers or hosts within the environment.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Kubernetes security measures, create unauthorized containers, and potentially gain control over the entire cluster. The observed impact includes privilege escalation, lateral movement, and data exfiltration. The severity of this attack depends on the level of access granted to the compromised container and the sensitivity of the data and resources within the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Auditd Manager to capture network and socket events, specifically monitoring for <code>connect</code> calls to Unix sockets as described in the <a href="https://docs.elastic.co/integrations/auditd_manager">Auditd Manager documentation</a>.</li>
<li>Deploy the Sigma rule &ldquo;Unusual Process Connecting to Docker or Containerd Socket&rdquo; to detect suspicious processes connecting to container runtime sockets, tuning <code>process.executable</code> and <code>user.name</code> for known legitimate processes.</li>
<li>Monitor file permissions on the socket paths (<code>/var/run/docker.sock</code>, <code>/run/docker.sock</code>, <code>/var/run/containerd/containerd.sock</code>, <code>/run/containerd/containerd.sock</code>) and restrict access to trusted groups only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>lateral-movement</category><category>linux</category></item><item><title>Suspicious SUID Binary Execution on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-suid-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-suid-execution/</guid><description>This rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious executions of common privilege elevation tools on Linux systems. It focuses on instances where binaries like <code>su</code>, <code>sudo</code>, <code>pkexec</code>, <code>passwd</code>, <code>chsh</code>, and <code>newgrp</code> are executed with root privileges but are initiated by a non-root user. The rule further refines its focus by analyzing the parent process context, specifically looking for interpreters (Python, Perl, Ruby, etc.), commands executed from user-writable directories (/tmp, /var/tmp, /dev/shm, /home, /run/user), or short shell command invocations. The detection is designed to uncover potential privilege escalation attempts that may be indicative of malicious activity. This is important because attackers frequently use SUID binaries to elevate privileges, and detecting unusual usage patterns can help identify compromised systems or insider threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A non-privileged user gains initial access to the system, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker navigates to a user-writable directory such as <code>/tmp</code> or <code>/home/&lt;user&gt;</code>.</li>
<li>The attacker crafts a malicious script or uses a one-liner command to invoke a SUID binary.</li>
<li>The SUID binary (e.g., <code>sudo</code>, <code>pkexec</code>, <code>su</code>) is executed with minimal arguments.</li>
<li>The system executes the command with root privileges due to the SUID bit being set on the binary.</li>
<li>The attacker leverages the elevated privileges to modify system files, install malicious software, or create new administrative accounts.</li>
<li>The attacker establishes persistence to maintain access to the compromised system.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, system disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of SUID binaries can lead to full system compromise. An attacker can gain complete control over the affected Linux system, potentially leading to data breaches, service disruptions, and the installation of persistent malware. This can affect critical infrastructure and sensitive data, causing significant financial and reputational damage. The severity is amplified when multiple systems are compromised, allowing for lateral movement and further exploitation within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and ensure that <code>process.user.id</code>, <code>process.real_user.id</code>, and <code>process.parent.user.id</code> are being captured to activate the rules below.</li>
<li>Deploy the &ldquo;Suspicious SUID Binary Execution&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Review authentication and sudoers policies to identify and remediate any misconfigurations.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the SUID binary execution and the parent process context.</li>
<li>Implement file integrity monitoring on sensitive system binaries and directories, particularly those related to privilege escalation, to detect unauthorized modifications.</li>
<li>Restrict the use of SUID binaries where possible and enforce strict permissions on those that are necessary.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>suid</category><category>linux</category></item><item><title>Suspicious Process Accessing Sensitive Identity Files via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</guid><description>This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to sensitive identity files on Linux systems. It leverages Auditd to monitor file access events and flags processes that are commonly used for copying, scripting, or staging files from temporary directories. The targeted files include Kubernetes service account tokens, kubelet configurations, cloud CLI configurations for AWS, Azure, and Google Cloud, root SSH keys, and Docker configurations. These files are critical for authentication and authorization within the system, and unauthorized access could lead to credential theft, privilege escalation, or lateral movement. This is especially important in cloud environments and containerized deployments where these files are commonly used for managing access to resources. The rule is designed to exclude user home paths to avoid false positives and focus on system-level access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system through various means, such as exploiting a vulnerability or compromising credentials.</li>
<li>The attacker uses a utility like <code>cp</code>, <code>cat</code>, or <code>curl</code> to access sensitive files such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> or <code>/root/.ssh/id_rsa</code>.</li>
<li>Auditd logs the file access event, capturing details about the process, user, and file path.</li>
<li>The detection rule identifies the suspicious process based on its name, executable path (e.g., <code>/tmp/*</code>), or command-line arguments.</li>
<li>The rule checks if the accessed file is in the list of sensitive identity files.</li>
<li>If both conditions are met, the rule triggers an alert, indicating potential unauthorized access to sensitive credentials.</li>
<li>The attacker exfiltrates the stolen credentials or uses them to move laterally within the network.</li>
<li>The attacker uses the stolen credentials to access cloud resources or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and financial losses. The targeted files contain credentials for Kubernetes clusters, cloud environments (AWS, Azure, Google Cloud), and SSH keys, potentially impacting a wide range of resources. The impact is particularly severe in environments where these credentials are used for managing critical infrastructure or accessing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Auditd Manager integration with the specified audit rules in the provided setup steps to monitor access to sensitive identity files on Linux systems. Ensure auditd is properly configured and running (<code>auditctl -l</code>) to generate the necessary logs.</li>
<li>Deploy the Sigma rules provided to detect suspicious processes accessing sensitive identity files and tune them for your environment by excluding legitimate processes or users as needed.</li>
<li>Investigate alerts generated by the Sigma rules, focusing on the process name, executable, parent command line, and the accessed file path to determine the legitimacy of the access.</li>
<li>Review and harden file permissions on shared credential stores to prevent unauthorized access. Rotate exposed keys and tokens and invalidate cloud sessions if a compromise is suspected, as suggested in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>linux</category><category>auditd</category></item><item><title>pyp2spec Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-pyp2spec-code-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pyp2spec-code-injection/</guid><description>pyp2spec before 0.14.1 is vulnerable to code injection by writing PyPI package metadata into generated spec files without escaping RPM macro directives, allowing malicious packages to execute arbitrary commands on the build machine.</description><content:encoded><![CDATA[<p>pyp2spec, a tool for generating RPM spec files from PyPI packages, contains a code injection vulnerability affecting versions prior to 0.14.1. The vulnerability stems from the tool&rsquo;s failure to properly escape RPM macro directives when writing PyPI package metadata (such as the summary field) into the generated spec file. This allows a malicious PyPI package to inject arbitrary commands into the spec file, which are then executed when an RPM tool processes the file. This poses a significant risk to package maintainers and build systems, particularly within the Fedora ecosystem where compromised credentials can lead to widespread supply chain attacks. The realistic attack vector involves typosquatting or targeting packages known to be under review.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious PyPI package containing specially formatted metadata, including an RPM macro directive (e.g., within the package summary).</li>
<li>A Fedora packager, intending to package a legitimate Python package, uses <code>pyp2spec</code> to generate an RPM spec file from the malicious PyPI package.</li>
<li><code>pyp2spec</code> writes the attacker-controlled metadata, including the unescaped RPM macro directive, into the generated spec file.</li>
<li>The packager, or an automated system, uses an RPM tool like <code>rpmbuild -bs</code>, <code>rpmbuild --nobuild</code>, or <code>rpm -q --specfile</code> to inspect or build the package from the spec file.</li>
<li>The RPM tool parses the spec file and, upon encountering the RPM macro directive, executes the embedded command.</li>
<li>The attacker&rsquo;s command executes on the build machine, potentially granting the attacker access to the packager&rsquo;s credentials (dist-git SSH keys, Koji build credentials, Bodhi update credentials).</li>
<li>The attacker uses the compromised credentials to commit malicious source code to the distribution&rsquo;s Git repository (dist-git).</li>
<li>The malicious code is built and distributed to end users through the normal package update pipeline, resulting in a supply chain attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the build machine. This can lead to the compromise of sensitive credentials, such as SSH keys and build system credentials. In the Fedora ecosystem, this could enable an attacker to inject malicious code into packages that are distributed to end users, potentially affecting millions of systems. The vulnerability poses a high risk to package maintainers and build systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>pyp2spec</code> version 0.14.1 or later to remediate the code injection vulnerability as described in the advisory (<a href="https://github.com/advisories/GHSA-r35x-v8p8-xvhw)">https://github.com/advisories/GHSA-r35x-v8p8-xvhw)</a>.</li>
<li>Implement file integrity monitoring on RPM spec files, alerting on unexpected modifications, to detect potentially malicious injected code. Use file_event logs with a rule like the one below.</li>
<li>Monitor process executions originating from RPM tools (<code>rpmbuild</code>, <code>rpm</code>), focusing on unusual or unexpected commands that could indicate exploitation, using process_creation logs and the Sigma rule provided.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>supply-chain</category><category>rpm</category><category>linux</category></item><item><title>Detection of Python Base64 Encoded Execution on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-python-base64-linux/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-python-base64-linux/</guid><description>This brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging Python one-liners with base64 encoding on Linux systems to deliver and execute malicious payloads. This technique allows for effective obfuscation, making it harder for conventional security solutions to detect the true nature of the executed commands. The use of <code>base64</code> within Python scripts executed directly from the command line is a red flag, as it is rarely observed in standard administrative tasks but is frequently used to hide malicious intent. Defenders must prioritize detecting this behavior to uncover potentially compromised systems and prevent further escalation. This activity has been observed in conjunction with fake AI websites used to deliver malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system through an undisclosed method (e.g., exploiting a vulnerability or social engineering).</li>
<li>The attacker uploads or creates a script containing a base64-encoded payload.</li>
<li>The attacker uses a Python one-liner, invoking the <code>python</code> interpreter.</li>
<li>The Python script imports the <code>base64</code> module.</li>
<li>The script decodes the base64-encoded payload using functions like <code>b64decode</code>, <code>b32decode</code>, or similar.</li>
<li>The decoded payload is executed using <code>eval()</code> or <code>exec()</code> within the same Python one-liner.</li>
<li>The executed payload establishes persistence, downloads further malware, or performs lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a full system compromise, data exfiltration, or the deployment of persistent backdoors. The obfuscation techniques make detection difficult, potentially allowing attackers to operate undetected for extended periods. While the specific number of victims and targeted sectors remain unknown, the technique&rsquo;s effectiveness in evading security measures makes it a high-priority threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Python Base64 One-Liners - Linux&rdquo; to your SIEM to detect the execution of Python one-liners utilizing base64 decoding (logsource: process_creation/linux).</li>
<li>Investigate any process creation events matching the Sigma rule, focusing on the parent processes and executed commands to identify the source of the malicious activity.</li>
<li>Enable and monitor process creation logs on Linux systems to ensure visibility of command-line execution, which is essential for detecting this type of attack (logsource: process_creation/linux).</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts, mitigating the risk of malicious payload execution after decoding.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>linux</category></item><item><title>Chmod Activity Targeting Sensitive Linux Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chmod-sensitive-directories/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chmod-sensitive-directories/</guid><description>Attackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.</description><content:encoded><![CDATA[<p>Attackers may leverage the <code>chmod</code> command on Linux systems to modify file permissions in sensitive directories. This can be used to establish persistence by altering permissions of startup scripts or cron jobs, escalate privileges by modifying permissions of sensitive binaries or configuration files, or disrupt system operations by restricting access to critical system resources. The referenced SysJoker malware has been observed using similar techniques. Detecting anomalous <code>chmod</code> activity…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>persistence</category><category>linux</category></item><item><title>Apko Package Substitution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-apko-package-substitution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-apko-package-substitution/</guid><description>Apko versions prior to 1.2.7 are vulnerable to package substitution due to not verifying downloaded apk packages against the APKINDEX checksum, potentially allowing an attacker who can substitute download responses to install arbitrary packages into built images.</description><content:encoded><![CDATA[<p>Apko, a tool for building container images, is susceptible to a critical package substitution vulnerability in versions prior to 1.2.7. The vulnerability stems from the tool&rsquo;s failure to validate downloaded <code>.apk</code> packages against the checksums recorded in the signed <code>APKINDEX.tar.gz</code> file. While Apko does verify the signature on the index and parses the checksums, it does not compare these checksums against the downloaded packages during the <code>getPackageImpl()</code> function. This oversight can allow an attacker with the ability to manipulate download responses, such as through compromised mirrors, HTTP repositories, or poisoned CDN caches, to inject malicious or unintended packages into the built container images. This issue was reported by Oleh Konko from 1seal.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a mirror, HTTP repository, or poisons a CDN cache used by apko.</li>
<li>A user initiates an apko build process, specifying a package to be included in the image.</li>
<li>Apko requests the specified package from the compromised source.</li>
<li>The attacker substitutes the legitimate package with a malicious or altered <code>.apk</code> package.</li>
<li>Apko downloads the substituted package.</li>
<li>Apko verifies the signature on <code>APKINDEX.tar.gz</code> but fails to validate the downloaded <code>.apk</code> package against the checksum in the index.</li>
<li>Apko installs the malicious or altered package into the container image.</li>
<li>The resulting container image is built with the compromised package, potentially leading to arbitrary code execution or other malicious activity when the image is deployed.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to inject arbitrary packages into container images built with vulnerable versions of apko. This can lead to a variety of adverse outcomes, including arbitrary code execution within containers, data exfiltration, and denial-of-service attacks. The lack of package validation provides a significant opportunity for attackers to compromise the integrity of containerized applications and infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to apko version 1.2.7 or later once a fix is available from the vendor.</li>
<li>Monitor network traffic for unexpected connections to untrusted or unusual package repositories using network connection logs and create rules to alert on such activity.</li>
<li>Implement integrity monitoring on the build system to detect unauthorized modification of files, specifically focusing on downloaded packages. This can be achieved through file integrity monitoring tools that generate file_event logs.</li>
<li>Deploy the provided Sigma rule to detect suspicious process executions within containers shortly after the build process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>package-substitution</category><category>supply-chain</category><category>linux</category></item><item><title>Suspicious Unshare Usage for Namespace Manipulation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</guid><description>The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.</description><content:encoded><![CDATA[<p>The <code>unshare</code> command in Linux is a utility used to create new namespaces, providing isolation for processes. While crucial for containerization and security, attackers can misuse <code>unshare</code> to escape container boundaries or escalate privileges by manipulating system namespaces. This occurs by creating namespaces that bypass established security controls. This activity is often observed when threat actors attempt to gain unauthorized access to host resources or elevate their privileges within a compromised system. The focus of this detection is on identifying unusual <code>unshare</code> executions that deviate from legitimate system management activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through exploiting a vulnerability in a containerized application.</li>
<li>The attacker executes the <code>unshare</code> command.</li>
<li><code>unshare</code> creates new namespaces, isolating the attacker&rsquo;s process from the rest of the system.</li>
<li>The attacker attempts to mount sensitive directories from the host system into the new namespace.</li>
<li>Using the newly gained access, the attacker attempts to modify system files, such as <code>/etc/passwd</code> or <code>/etc/shadow</code>, to create new privileged accounts.</li>
<li>The attacker leverages the elevated privileges to install persistent backdoors or malware on the host system.</li>
<li>The attacker attempts to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via <code>unshare</code> can lead to privilege escalation, container escape, and unauthorized access to sensitive resources on the host system. The impact includes potential data breaches, system compromise, and lateral movement within the network. While the number of victims is unknown, the widespread use of containerization technologies makes this a significant threat, particularly for organizations relying on Linux-based container environments and cloud infrastructures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Namespace Manipulation Using Unshare</code> to your SIEM to detect suspicious <code>unshare</code> command executions and tune for your environment.</li>
<li>Enable Auditbeat or Elastic Defend to collect the necessary process execution data to trigger the provided Sigma rule, as outlined in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review and tune the provided Sigma rule&rsquo;s exclusion list based on your environment&rsquo;s legitimate use cases for <code>unshare</code>, as described in the &ldquo;False positive analysis&rdquo; section.</li>
<li>Implement additional monitoring and alerting for unusual <code>unshare</code> usage patterns to enhance detection capabilities and prevent future occurrences as recommended in the &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>container-escape</category><category>linux</category></item><item><title>Suspicious Unshare Usage for Container Escape and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unshare-container-escape/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unshare-container-escape/</guid><description>The rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.</description><content:encoded><![CDATA[<p>The <code>unshare</code> command in Linux is used to create new namespaces, isolating processes from the rest of the system. This isolation is crucial for containerization and security. However, attackers can exploit <code>unshare</code> to break out of containers or elevate privileges by creating namespaces that bypass security controls. This activity has been observed in containerized environments where threat actors attempt to gain unauthorized access to the host system or escalate their privileges within the container. The detection rule identifies suspicious <code>unshare</code> executions by monitoring process starts, filtering out benign parent processes, and focusing on unusual usage patterns, thus highlighting potential misuse. The rule covers activity starting from Elastic Defend for Containers version 9.3.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A containerized process is compromised, potentially through an initial exploit or misconfiguration.</li>
<li>The attacker executes the <code>unshare</code> command within the container.</li>
<li><code>unshare</code> is used to create new namespaces, isolating the attacker&rsquo;s process from the container&rsquo;s limitations.</li>
<li>The attacker manipulates these namespaces to gain access to resources outside the container.</li>
<li>The attacker attempts to escape the container by leveraging the newly created namespaces.</li>
<li>Upon successful escape, the attacker gains access to the host system.</li>
<li>The attacker escalates privileges on the host, potentially exploiting vulnerabilities or misconfigurations.</li>
<li>The attacker achieves full control over the host system, allowing for data exfiltration, system compromise, or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to container escape, allowing attackers to gain unauthorized access to the host system. This can result in privilege escalation, data exfiltration, and complete system compromise. The rule aims to detect and prevent such attacks by identifying suspicious usage of the <code>unshare</code> command, helping to maintain the integrity and security of containerized environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>unshare</code> executions within containers and tune for your environment.</li>
<li>Review and whitelist legitimate uses of <code>unshare</code> by system management tools like <code>udevadm</code> and <code>systemd-udevd</code> to reduce false positives, as mentioned in the rule&rsquo;s description.</li>
<li>Implement additional monitoring and alerting for unusual <code>unshare</code> usage patterns to enhance detection capabilities and prevent future occurrences.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>container-escape</category><category>linux</category></item><item><title>Potential Kubeletctl Execution on Linux Hosts</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubeletctl-execution/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubeletctl-execution/</guid><description>This rule detects the execution of kubeletctl, a command-line tool used to interact with the Kubelet API, on Linux hosts, potentially leading to discovery and lateral movement within Kubernetes environments.</description><content:encoded><![CDATA[<p>The kubeletctl tool simplifies access to Kubelet endpoints, potentially allowing attackers to perform discovery and lateral movement within Kubernetes environments. The tool can be used to enumerate pods and nodes, and attempt actions such as exec/attach/portForward. Attackers may run <code>kubeletctl scan</code> to find reachable Kubelet endpoints, then use <code>pods</code> or <code>exec/attach</code> for follow-on access. This activity is typically observed on Linux hosts within containerized environments. Defenders should monitor for the execution of kubeletctl with suspicious arguments or connections to Kubelet ports (commonly 10250/10255).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a compromised host within the Kubernetes environment.</li>
<li>Attacker downloads or transfers the <code>kubeletctl</code> binary to the compromised host.</li>
<li>Attacker executes <code>kubeletctl scan</code> to identify accessible Kubelet API endpoints by scanning for open ports 10250 and 10255.</li>
<li>Attacker uses <code>kubeletctl pods</code> to enumerate running pods on a targeted node based on the scan results.</li>
<li>Attacker leverages <code>kubeletctl exec</code> or <code>kubeletctl attach</code> to gain shell access to a pod.</li>
<li>Attacker uses the compromised pod to move laterally within the Kubernetes cluster, potentially accessing sensitive data or resources.</li>
<li>Attacker may attempt to access Kubernetes credentials, such as service account tokens or kubeconfigs, for further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can allow attackers to enumerate pods and nodes, execute commands within containers, and potentially move laterally within the Kubernetes cluster. This could lead to unauthorized access to sensitive data, resource hijacking, or complete compromise of the Kubernetes environment. The CyberArk research cited in the references describes how kubeletctl can be leveraged to attack Kubernetes clusters.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Kubeletctl Execution</code> to detect suspicious execution of the <code>kubeletctl</code> binary on Linux hosts, focusing on command-line arguments such as <code>scan</code>, <code>pods</code>, <code>exec</code>, and <code>attach</code>.</li>
<li>Monitor host and container telemetry for connections to Kubelet ports (10250/10255) using a network connection rule and look for scanning patterns across multiple nodes.</li>
<li>Restrict access to Kubelet ports at the network layer and harden Kubelet authentication/authorization based on the recommendations in the provided references.</li>
<li>Rotate/revoke any exposed Kubernetes credentials (service account tokens, kubeconfigs, client certs) and investigate for follow-on discovery or execution attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>kubeletctl</category><category>container</category><category>linux</category></item><item><title>Nsenter Execution with Target Flag Inside Container</title><link>https://feed.craftedsignal.io/briefs/2024-01-nsenter-container-escape/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nsenter-container-escape/</guid><description>The rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>nsenter</code> within a Linux container, specifically when the <code>-t</code> or <code>--target</code> flag is used. This flag indicates an attempt to enter another process or namespace context. Attackers can exploit this capability, especially when combined with privileged mounts, exposed PIDs, or shared namespaces, to escape the container and pivot to the host system. This activity can lead to privilege escalation and further compromise of the underlying infrastructure. The detection is relevant for environments using Elastic Defend for Containers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through exploiting a vulnerability in a containerized application.</li>
<li>The attacker identifies a container with weak configurations, such as exposed PIDs, shared namespaces, or privileged mounts.</li>
<li>The attacker executes <code>nsenter</code> with the <code>-t</code> or <code>--target</code> flag, specifying a target PID or namespace.</li>
<li>The <code>nsenter</code> command joins the target namespace (mount, network, PID, user, or IPC) based on specified flags (<code>-m</code>, <code>-n</code>, <code>-p</code>, <code>-U</code>, or <code>-i</code>).</li>
<li>The attacker gains access to the host system&rsquo;s resources or processes due to the namespace sharing or privileged access.</li>
<li>The attacker escalates privileges on the host system, potentially gaining root access.</li>
<li>The attacker pivots to other containers or the host infrastructure, expanding their control.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system disruption, or deploying malware on the host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can allow an attacker to compromise the underlying host system. This can lead to the compromise of other containers running on the same host, as well as sensitive data stored on the host system. The impact can range from data breaches to complete infrastructure takeover. If the host is a node in a Kubernetes cluster, the attacker might be able to compromise the entire cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Nsenter Container Escape</code> to your SIEM and tune for your environment to detect suspicious <code>nsenter</code> executions within containers.</li>
<li>Review container configurations and enforce least privilege to prevent unauthorized namespace sharing and privileged mounts.</li>
<li>Monitor container logs for <code>nsenter</code> executions with target flags, as indicated by the log source <code>logs-cloud_defend.process*</code> and the query in this brief.</li>
<li>Restrict the use of hostPath volumes and other sensitive mounts within container deployments.</li>
<li>Reduce recurrence by avoiding host namespace sharing, restricting hostPath and sensitive mounts, and blocking unnecessary capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>linux</category></item></channel></rss>