Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

Posted on November 1, 2025November 1, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued an pressing alert a few essential use-after-free vulnerability within the Linux kernel, tracked as CVE-2024-1086.

This vulnerability, hidden throughout the netfilter: nf_tables part, permits native attackers to escalate their privileges and probably deploy ransomware, which might severely disrupt enterprise methods worldwide.

First disclosed earlier this yr, the vulnerability has now been linked to lively exploitation campaigns focusing on unpatched Linux servers, in accordance with CISA’s Recognized Exploited Vulnerabilities (KEV) catalog up to date on October 31, 2025.

As Linux powers every little thing from cloud infrastructure to IoT gadgets, this warning underscores the rising menace to open-source ecosystems amid rising ransomware incidents.

Safety researchers have confirmed that attackers exploit CVE-2024-1086 by crafting malicious netfilter guidelines that set off improper reminiscence deallocation. As soon as a person with native entry typically gained by phishing or weak credentials runs the exploit, the system frees reminiscence related to a community desk however fails to nullify the pointer, permitting reuse of dangling references.

This results in arbitrary code execution with root privileges, paving the best way for ransomware deployment like LockBit or Conti variants.

CISA emphasizes quick patching, noting that affected variations span extensively used distributions reminiscent of Ubuntu, Crimson Hat Enterprise Linux, and Debian, significantly in variations predating kernel 6.1.77.

Linux Kernel Use-After-Free Vulnerability Exploited

The vulnerability stems from a basic use-after-free error (CWE-416), the place the kernel’s netfilter subsystem mishandles desk destruction throughout rule evaluations. An attacker wants solely native execution rights, making it a potent second-stage payload after preliminary entry.

In ransomware situations, menace actors chain this with social engineering to encrypt recordsdata and exfiltrate information, demanding ransoms in cryptocurrency. Exploitation proofs-of-concept have circulated on underground boards since March 2024, with real-world assaults spiking in Q3 2025 towards healthcare and monetary sectors.

For an in depth overview, see the CVE specs under:

CVE IDDescriptionAffected Merchandise/VersionsCVSS v3.1 ScoreTechnical DetailsMitigationCVE-2024-1086Use-after-free in netfilter: nf_tables resulting in native privilege escalationLinux Kernel 7.8 (Excessive)Reminiscence deallocation flaw in nftables rule processing; requires native entry; allows root shell through dangling pointer reuseUpdate to kernel 6.1.77+; disable nf_tables if unused; apply vendor patches (e.g., Ubuntu USN-6190-1)

Organizations ought to scan environments utilizing instruments like Lynis or OpenVAS for susceptible kernels and apply mitigations per vendor steerage.

If updates are unavailable, CISA advises discontinuing use of affected merchandise. This incident highlights the dangers of legacy Linux deployments in hybrid clouds, the place attackers more and more goal open-source flaws for high-impact ransomware.

As exploitation evolves, proactive kernel hardening, reminiscent of enabling SELinux and monitoring netfilter logs, stays important to thwart these stealthy threats.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, CISA, Deploy, Exploited, Kernel, Linux, Ransomware, UseAfterFree, Vulnerability, Warns

Post navigation

Previous Post: Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
Next Post: Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

Related Posts

Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Security News
Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Cyber Security News
WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login Cyber Security News
APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware Cyber Security News
Threat Group ‘Crimson Collective’ Allegedly Claim Breach of Largest Fiber Broadband Brightspeed Cyber Security News
Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark