CISA warns of ransomware exploiting Linux kernel vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about ongoing ransomware attacks targeting a known Linux kernel vulnerability. Federal agencies must update affected systems by November 20 or discontinue their use. The alert highlights that Linux is not immune to such threats, debunking myths about ransomware's decline and Windows as the sole target.

The vulnerability in question is CVE-2024-1086, a use-after-free flaw in the Linux kernel discovered nearly two years ago and patched in January 2024. According to Immersive Security, it 'allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware.' The flaw occurs when the system mishandles memory, enabling attackers to gain complete control.

CISA's binding directive, issued recently, confirms that ransomware threat actors are actively exploiting this vulnerability in certain older versions of the Linux operating system. Federal agencies have until November 20 to apply the fix or stop using the affected products. While aimed at government entities, the warning applies broadly to businesses, as proof-of-concept code is readily available on the dark web and criminal marketplaces.

Attackers often combine CVE-2024-1086 with standard phishing techniques to infiltrate systems. The U.S. Department of Commerce's National Institute of Standards and Technology has published a list of impacted Linux versions. CISA emphasizes that ransomware remains a significant threat, countering perceptions of its decline and the idea that only Windows systems are at risk.

This reminder underscores the importance of timely updates across all operating systems to mitigate real-world harms from these exploits.

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline