Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

Posted on June 19, 2025June 19, 2025 By CWS

Jun 19, 2025Ravie LakshmananLinux / Vulnerability

Cybersecurity researchers have uncovered two native privilege escalation (LPE) flaws that might be exploited to achieve root privileges on machines working main Linux distributions.
The vulnerabilities, found by Qualys, are listed beneath –

CVE-2025-6018 – LPE from unprivileged to allow_active in SUSE 15’s Pluggable Authentication Modules (PAM)
CVE-2025-6019 – LPE from allow_active to root in libblockdev through the udisks daemon

“These fashionable ‘local-to-root’ exploits have collapsed the hole between an peculiar logged-in consumer and a full system takeover,” Saeed Abbasi, Senior Supervisor at Qualys Menace Analysis Unit (TRU), mentioned.

“By chaining legit companies equivalent to udisks loop-mounts and PAM/setting quirks, attackers who personal any energetic GUI or SSH session can vault throughout polkit’s allow_active belief zone and emerge as root in seconds.”
The cybersecurity firm mentioned CVE-2025-6018 is current within the PAM configuration of openSUSE Leap 15 and SUSE Linux Enterprise 15, enabling an unprivileged native attacker to raise to the “allow_active” consumer and name Polkit actions which might be in any other case reserved for a bodily current consumer.
CVE-2025-6019, alternatively, impacts libblockdev and is exploitable through the udisks daemon included by default on most Linux distributions. It primarily permits an “allow_active” consumer to achieve full root privileges by chaining it with CVE-2025-6018.
“Though it nominally requires ‘allow_active’ privileges, udisks ships by default on nearly all Linux distributions, so practically any system is susceptible,” Abbasi added. “Methods to achieve ‘allow_active,’ together with the PAM situation disclosed right here, additional negate that barrier.”
As soon as root privileges are obtained, an attacker has carte blanche entry to the system, permitting them use it as a springboard for broader post-compromise actions, equivalent to altering safety controls and implanting backdoors for covert entry.
Qualys mentioned it has developed proof-of-concept (PoC) exploits to verify the presence of those vulnerabilities on numerous working methods, together with Ubuntu, Debian, Fedora, and openSUSE Leap 15.

To mitigate the danger posed by these flaws, it is important to use patches supplied by the Linux distribution distributors. As short-term workarounds, customers can modify the Polkit rule for “org.freedesktop.udisks2.modify-device” to require administrator authentication (“auth_admin”).
Flaw Disclosed in Linux PAM
The disclosure comes as maintainers of Linux PAM resolved a high-severity path traversal flaw (CVE-2025-6020, CVSS rating: 7.8) that would additionally permit an area consumer to escalate to root privileges. The difficulty has been fastened in model 1.7.1.

“The module pam_namespace in linux-pam <= 1.7.0 might entry user-controlled paths with out correct protections, which permits an area consumer to raise their privileges to root through a number of symlink assaults and race situations,” Linux PAM maintainer Dmitry V. Levin mentioned.
Linux methods are susceptible in the event that they use pam_namespace to arrange polyinstantiated directories for which the trail to both the polyinstantiated listing or occasion listing is underneath user-control. As workarounds for CVE-2025-6020, customers can disable pam_namespace or guarantee it doesn’t function on user-controlled paths.
ANSSI’s Olivier Bal-Petre, who reported the flaw to the maintainer on January 29, 2025, mentioned customers must also replace their namespace.init script if they don’t use the one supplied by their distribution to make sure that the both of two paths are protected to function on as root.

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Access, Distributions, Enable, Flaws, Full, Linux, Major, PAM, Root, Udisks

Post navigation

Previous Post: Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates
Next Post: Meta Adds Passkey Login Support to Facebook for Android and iOS Users

Related Posts

WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks The Hacker News
Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies The Hacker News
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users The Hacker News
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin The Hacker News
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper The Hacker News
SEC Files Charges Over  Million Crypto Scam Using Fake AI-Themed Investment Tips SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News