Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

Posted on November 1, 2025November 1, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued an pressing alert a few essential use-after-free vulnerability within the Linux kernel, tracked as CVE-2024-1086.

This vulnerability, hidden throughout the netfilter: nf_tables part, permits native attackers to escalate their privileges and probably deploy ransomware, which might severely disrupt enterprise methods worldwide.

First disclosed earlier this yr, the vulnerability has now been linked to lively exploitation campaigns focusing on unpatched Linux servers, in accordance with CISA’s Recognized Exploited Vulnerabilities (KEV) catalog up to date on October 31, 2025.

As Linux powers every little thing from cloud infrastructure to IoT gadgets, this warning underscores the rising menace to open-source ecosystems amid rising ransomware incidents.

Safety researchers have confirmed that attackers exploit CVE-2024-1086 by crafting malicious netfilter guidelines that set off improper reminiscence deallocation. As soon as a person with native entry typically gained by phishing or weak credentials runs the exploit, the system frees reminiscence related to a community desk however fails to nullify the pointer, permitting reuse of dangling references.

This results in arbitrary code execution with root privileges, paving the best way for ransomware deployment like LockBit or Conti variants.

CISA emphasizes quick patching, noting that affected variations span extensively used distributions reminiscent of Ubuntu, Crimson Hat Enterprise Linux, and Debian, significantly in variations predating kernel 6.1.77.

Linux Kernel Use-After-Free Vulnerability Exploited

The vulnerability stems from a basic use-after-free error (CWE-416), the place the kernel’s netfilter subsystem mishandles desk destruction throughout rule evaluations. An attacker wants solely native execution rights, making it a potent second-stage payload after preliminary entry.

In ransomware situations, menace actors chain this with social engineering to encrypt recordsdata and exfiltrate information, demanding ransoms in cryptocurrency. Exploitation proofs-of-concept have circulated on underground boards since March 2024, with real-world assaults spiking in Q3 2025 towards healthcare and monetary sectors.

For an in depth overview, see the CVE specs under:

CVE IDDescriptionAffected Merchandise/VersionsCVSS v3.1 ScoreTechnical DetailsMitigationCVE-2024-1086Use-after-free in netfilter: nf_tables resulting in native privilege escalationLinux Kernel 7.8 (Excessive)Reminiscence deallocation flaw in nftables rule processing; requires native entry; allows root shell through dangling pointer reuseUpdate to kernel 6.1.77+; disable nf_tables if unused; apply vendor patches (e.g., Ubuntu USN-6190-1)

Organizations ought to scan environments utilizing instruments like Lynis or OpenVAS for susceptible kernels and apply mitigations per vendor steerage.

If updates are unavailable, CISA advises discontinuing use of affected merchandise. This incident highlights the dangers of legacy Linux deployments in hybrid clouds, the place attackers more and more goal open-source flaws for high-impact ransomware.

As exploitation evolves, proactive kernel hardening, reminiscent of enabling SELinux and monitoring netfilter logs, stays important to thwart these stealthy threats.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, CISA, Deploy, Exploited, Kernel, Linux, Ransomware, UseAfterFree, Vulnerability, Warns

Post navigation

Previous Post: Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
Next Post: Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

Related Posts

INE Expands Cross-Skilling Innovations INE Expands Cross-Skilling Innovations Cyber Security News
Critical IDIS IP Cameras One-Click Vulnerability Leads to full Compromise of Victim’s Computer Critical IDIS IP Cameras One-Click Vulnerability Leads to full Compromise of Victim’s Computer Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses Cyber Security News
VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection Cyber Security News
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News