Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CrackArmor Flaws Expose Millions of Linux Servers to Risks

CrackArmor Flaws Expose Millions of Linux Servers to Risks

Posted on March 13, 2026 By CWS

CrackArmor Vulnerabilities Threaten Linux Systems

CrackArmor, a set of nine critical vulnerabilities in AppArmor, poses a significant threat to over 12.6 million Linux servers globally. These vulnerabilities can allow unprivileged users to gain root access, disrupt container isolation, and crash kernel operations. AppArmor, a widely-used access control framework, has been affected by these issues since Linux kernel version 4.11, which dates back to 2017.

Discoveries and Disclosure

The Qualys Threat Research Unit (TRU) identified these vulnerabilities, publicly revealing them on March 12, 2026. Although the flaws reside within AppArmor’s implementation as a Linux Security Module, the underlying security model remains intact. With AppArmor enabled by default on major Linux distributions like Ubuntu, Debian, and SUSE, the affected attack surface is extensive.

According to Qualys, the vulnerabilities impact more than 12.6 million enterprise Linux systems. Immediate remediation is essential, with security teams advised not to delay despite the absence of CVE identifiers, which are expected to be issued after the kernel team addresses the issues.

Breaking Down the Flaws

Central to the CrackArmor vulnerabilities is a confused deputy flaw, where unprivileged users can manipulate privileged processes. Attackers can exploit this by interacting with AppArmor’s pseudo-files, leveraging trusted tools such as Sudo and Postfix to execute unauthorized actions.

The potential attack chains are severe, ranging from silent removal of critical system protections, local privilege escalation to root, to kernel-space privilege escalation via a use-after-free vulnerability. Moreover, these flaws can facilitate escape from container and namespace restrictions and even cause kernel panic through stack exhaustion.

Mitigation and Response

Organizations are urged to apply security patches from vendors like Ubuntu, Debian, and SUSE without delay. Additionally, deploying Qualys QID 386714 can help scan for affected AppArmor versions, especially on internet-facing assets. Monitoring for unexpected profile changes in AppArmor directories is crucial to detect active exploitation attempts.

Qualys has developed proof-of-concept exploit code but has refrained from releasing it publicly to allow time for patch deployments. Meanwhile, security teams should leverage Qualys CyberSecurity Asset Management tools to assess their systems’ exposure and mitigate risks effectively.

Stay informed on cybersecurity updates through Qualys’ channels, and ensure your systems are protected against these critical vulnerabilities.

Cyber Security News Tags:AppArmor, CrackArmor, Cybersecurity, enterprise Linux, kernel security, Linux security, Linux servers, Qualys, security patch, Vulnerabilities

Post navigation

Previous Post: Meta Unveils Advanced Anti-Scam Features on Key Platforms
Next Post: Critical OpenSSH GSSAPI Flaw Threatens Linux Servers

Related Posts

G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload G_Wagon npm Package Attacking Users to Exfiltrates Browser Credentials using Obfuscated Payload Cyber Security News
Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table Cyber Security News
North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets Cyber Security News
Top 10 Best API Security Testing Tools in 2025 Top 10 Best API Security Testing Tools in 2025 Cyber Security News
AI-Driven Malware Surge by Transparent Tribe AI-Driven Malware Surge by Transparent Tribe Cyber Security News
Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Onyx Security Secures $40 Million to Enhance AI Control
  • Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8
  • Salesforce Issues Alert on ShinyHunters Threat to Experience Cloud
  • Global Agencies Dismantle SocksEscort Proxy Network
  • Google Urgently Updates Chrome to Fix Exploited Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Onyx Security Secures $40 Million to Enhance AI Control
  • Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8
  • Salesforce Issues Alert on ShinyHunters Threat to Experience Cloud
  • Global Agencies Dismantle SocksEscort Proxy Network
  • Google Urgently Updates Chrome to Fix Exploited Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News