home.social

#privilegeescalation — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #privilegeescalation, aggregated by home.social.

  1. Linux Flaw Exposes Systems to Root Privilege Attacks

    A newly discovered Linux kernel vulnerability, dubbed Fragnasia, allows hackers to gain root privileges and take control of your system - and it's been hiding in plain sight in all Linux kernels released before May 13, 2026. This high-severity flaw lets unprivileged attackers write malicious code into read-only files, giving…

    osintsights.com/linux-flaw-exp

    #LinuxKernelVulnerability #Cve202646300 #Fragnesia #EmergingThreats #PrivilegeEscalation

  2. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  3. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  4. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  5. Made Public As Latest Local

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the page cache of read-only files through a separate ESP/XFRM logic bug.

    linux.slashdot.org/story/26/05

  6. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  7. 🚨 Oh no, not another "all versions" #bug in FreeBSD! 🎉 Apparently, executing a program in your own system is now a privilege escalation 🧙‍♂️✨ Bravo to FreeBSD's stellar security team for fixing a problem that they didn't know existed until Ryan from Calif.io came along to enlighten them. 🙃🔒
    freebsd.org/security/advisorie #FreeBSD #PrivilegeEscalation #SecurityFix #HackerNews #Califio #HackerNews #ngated

  8. 🚨 Oh no, not another "all versions" #bug in FreeBSD! 🎉 Apparently, executing a program in your own system is now a privilege escalation 🧙‍♂️✨ Bravo to FreeBSD's stellar security team for fixing a problem that they didn't know existed until Ryan from Calif.io came along to enlighten them. 🙃🔒
    freebsd.org/security/advisorie #FreeBSD #PrivilegeEscalation #SecurityFix #HackerNews #Califio #HackerNews #ngated

  9. 🚨 Oh no, not another "all versions" #bug in FreeBSD! 🎉 Apparently, executing a program in your own system is now a privilege escalation 🧙‍♂️✨ Bravo to FreeBSD's stellar security team for fixing a problem that they didn't know existed until Ryan from Calif.io came along to enlighten them. 🙃🔒
    freebsd.org/security/advisorie #FreeBSD #PrivilegeEscalation #SecurityFix #HackerNews #Califio #HackerNews #ngated

  10. 🚨 Oh no, not another "all versions" #bug in FreeBSD! 🎉 Apparently, executing a program in your own system is now a privilege escalation 🧙‍♂️✨ Bravo to FreeBSD's stellar security team for fixing a problem that they didn't know existed until Ryan from Calif.io came along to enlighten them. 🙃🔒
    freebsd.org/security/advisorie #FreeBSD #PrivilegeEscalation #SecurityFix #HackerNews #Califio #HackerNews #ngated

  11. 🚨 Oh no, not another "all versions" #bug in FreeBSD! 🎉 Apparently, executing a program in your own system is now a privilege escalation 🧙‍♂️✨ Bravo to FreeBSD's stellar security team for fixing a problem that they didn't know existed until Ryan from Calif.io came along to enlighten them. 🙃🔒
    freebsd.org/security/advisorie #FreeBSD #PrivilegeEscalation #SecurityFix #HackerNews #Califio #HackerNews #ngated

  12. Copy Fail Linux Privilege

    Copy Fail is a Linux kernel privilege escalation flaw. Learn who may be affected, why it matters, and how to update safely.

    beitmenotyou.online/copy-fail-

  13. Copy Fail Linux Privilege

    Copy Fail is a Linux kernel privilege escalation flaw. Learn who may be affected, why it matters, and how to update safely.

    beitmenotyou.online/copy-fail-

  14. And here's another one:
    github.com/0xdeadbeefnetwork/C

    This one is not fixed by f4c50a40, so all current kernels are vulnerable. Looks like mitigation is possible by blocking kernel modules `esp4` + `esp6` here as well (and breaking #IPSec in doing so). Can someone confirm?

    Why is it called "Electric Boogaloo"… is this a #DonaldByrd fan? Were they inspired by this week's @thekalimerashow shows??

    #privilegeescalation #linux #vulnerability #linuxadmin #sysadmin #exploit #copyfail2 #electricboogaloo

  15. Here we go again :-/ Another deterministic #privilegeescalation bug in the #Linux kernel. Make sure you're using at least the following version of your branch to mitigate against #dirtyfrag:

    - 7.0.5
    - 6.18.28
    - 6.12.87
    - 6.6.138
    - 6.1.171
    - 5.15.205
    - 5.10.255

    6.19 is eol, so it probably won't get patched. Remove and blocklist the following modules if you have to use an unpatched kernel: esp4 esp6 rxrpc

    See github.com/V4bel/dirtyfrag/blo for more info.

    #vulnerability #linuxadmin #sysadmin #exploit

  16. Copy fail : depuis 2017, une faille dans le noyau Linux permettait à un utilisateur de passer root.

    30 avril 2026 - Martin Clavey

    Depuis 2017, une vulnérabilité dans le module cryptographique authencesn du noyau Linux laissait à un compte d’un simple utilisateur la possibilité de passer en root. Elle concerne la plupart des grandes distributions jusqu’au déploiement du patch, qui est déjà en cours.

    1/

    next.ink/236230/copy-fail-depu

    #Linux #CopyFail #Xint #Root #authencesn #SuperUser #Docker #Kubernetes #Vulnerability #Debian #Python #Patch #Cybersecurity #InfoSec #Data_Breach #PrivilegeEscalation #Privilege #Kernel #AEAD #AuthenticatedEncryption

  17. Copy fail : depuis 2017, une faille dans le noyau Linux permettait à un utilisateur de passer root.

    30 avril 2026 - Martin Clavey

    Depuis 2017, une vulnérabilité dans le module cryptographique authencesn du noyau Linux laissait à un compte d’un simple utilisateur la possibilité de passer en root. Elle concerne la plupart des grandes distributions jusqu’au déploiement du patch, qui est déjà en cours.

    1/

    next.ink/236230/copy-fail-depu

    #Linux #CopyFail #Xint #Root #authencesn #SuperUser #Docker #Kubernetes #Vulnerability #Debian #Python #Patch #Cybersecurity #InfoSec #Data_Breach #PrivilegeEscalation #Privilege #Kernel #AEAD #AuthenticatedEncryption

  18. Copy fail : depuis 2017, une faille dans le noyau Linux permettait à un utilisateur de passer root.

    30 avril 2026 - Martin Clavey

    Depuis 2017, une vulnérabilité dans le module cryptographique authencesn du noyau Linux laissait à un compte d’un simple utilisateur la possibilité de passer en root. Elle concerne la plupart des grandes distributions jusqu’au déploiement du patch, qui est déjà en cours.

    1/

    next.ink/236230/copy-fail-depu

    #Linux #CopyFail #Xint #Root #authencesn #SuperUser #Docker #Kubernetes #Vulnerability #Debian #Python #Patch #Cybersecurity #InfoSec #Data_Breach #PrivilegeEscalation #Privilege #Kernel #AEAD #AuthenticatedEncryption

  19. Copy fail : depuis 2017, une faille dans le noyau Linux permettait à un utilisateur de passer root.

    30 avril 2026 - Martin Clavey

    Depuis 2017, une vulnérabilité dans le module cryptographique authencesn du noyau Linux laissait à un compte d’un simple utilisateur la possibilité de passer en root. Elle concerne la plupart des grandes distributions jusqu’au déploiement du patch, qui est déjà en cours.

    1/

    next.ink/236230/copy-fail-depu

    #Linux #CopyFail #Xint #Root #authencesn #SuperUser #Docker #Kubernetes #Vulnerability #Debian #Python #Patch #Cybersecurity #InfoSec #Data_Breach #PrivilegeEscalation #Privilege #Kernel #AEAD #AuthenticatedEncryption

  20. Copy fail : depuis 2017, une faille dans le noyau Linux permettait à un utilisateur de passer root.

    30 avril 2026 - Martin Clavey

    Depuis 2017, une vulnérabilité dans le module cryptographique authencesn du noyau Linux laissait à un compte d’un simple utilisateur la possibilité de passer en root. Elle concerne la plupart des grandes distributions jusqu’au déploiement du patch, qui est déjà en cours.

    1/

    next.ink/236230/copy-fail-depu

    #Linux #CopyFail #XintIo #Root #authencesn #SuperUser #Docker #Vulnerability #Debian #Python #Patch #Cybersecurity #InfoSec #Data_Breach #PrivilegeEscalation #Privilege #Kernel #AEAD #AuthenticatedEncryption

  21. Linux Privilege Escalation Cheat Sheet: Techniques and Prevention.

    In this cheat sheet, I break down essential enumeration commands, common escalation paths, and practical techniques every security professional should know.
    denizhalil.com/2025/06/30/linu

    #CyberSecurity #LinuxSecurity #PrivilegeEscalation #Pentesting #RedTeam #BlueTeam #InfoSec #ethicalhacking #SecurityEngineering #itsecurity

  22. I couldn't find a list of #Linux #kernel versions that include a patch for #copyfail, so I dug into the commit log and made one. Make sure you're using at least the following version of your branch to mitigate against copyfail:

    - 7.0-rc7 (any stable 7.x is safe)
    - 6.19.12
    - 6.18.22
    - 6.12.85
    - 6.6.137
    - 6.1.170
    - 5.15.204
    - 5.10.254

    See copy.fail for more info about the #exploit.

    #privilegeescalation #vulnerability #cryptography #linuxadmin #sysadmin

  23. Sequence [TryHackMe] [Writeup]

    Room Info Name: Sequence Platform: TryHackMe Difficulty: Medium Link: https://tryhackme.com/room/sequence Description: Chain multiple vulnerabilities to take control of a system. Task 1: Challenge Robert made some last-minute updates to the review.thm website before heading off on vacation. He claims that the secret information of the financiers is fully protected. But are his defenses truly airtight? Your challenge is to exploit the vulnerabilities and gain complete control of the […]

    aredopseagle.wordpress.com/202

  24. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  25. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  26. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  27. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  28. @TilliAtHome Habe gelesen, daß es für Desktops mit IntelCPU nur 5% Leistungsgewinn bringt,?! Also hab ich mich nicht weiter damit beschäftigt 🤔 teste ich mal an einem offline Rechner 👍 Die Einschätzung des Risikos durch z.B. #spectre oder #meltdown und mögliche #Angriffsvektoren habe ich anderen überlassen, jetzt stellt sich mir auch noch mal die Frage, wie groß ist das Risiko für welche Nutzungsszenarien?

    #itsec #malware #ransomware #phishing #privilegeescalation #linux #foreshadow #zombieload

  29. 🔥 Open-source project: Automated audit & hardening of Linux cron jobs (LPE detection & scripts)

    After several months of research and lab testing, I’m releasing a complete guide + scripts to detect and fix privilege escalation via misconfigured cron jobs on Linux (automated audit, exploitation examples, hardening tips, etc.).

    💡 Example: root shell on a cloud VM through a simple cron misconfiguration (see screenshot).

    For sysadmins, SecOps, pentesters, or anyone passionate about Linux security.

    👉 GitHub repo: github.com/privlabs/lpe-cron-m

    Feel free to test, comment, or contribute! Would love your feedback or stories of similar issues you’ve found.

    #linux #infosec #sysadmin #opensource #cybersecurity #privilegeescalation