Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

Posted on November 1, 2025November 1, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued an pressing alert a few essential use-after-free vulnerability within the Linux kernel, tracked as CVE-2024-1086.

This vulnerability, hidden throughout the netfilter: nf_tables part, permits native attackers to escalate their privileges and probably deploy ransomware, which might severely disrupt enterprise methods worldwide.

First disclosed earlier this yr, the vulnerability has now been linked to lively exploitation campaigns focusing on unpatched Linux servers, in accordance with CISA’s Recognized Exploited Vulnerabilities (KEV) catalog up to date on October 31, 2025.

As Linux powers every little thing from cloud infrastructure to IoT gadgets, this warning underscores the rising menace to open-source ecosystems amid rising ransomware incidents.

Safety researchers have confirmed that attackers exploit CVE-2024-1086 by crafting malicious netfilter guidelines that set off improper reminiscence deallocation. As soon as a person with native entry typically gained by phishing or weak credentials runs the exploit, the system frees reminiscence related to a community desk however fails to nullify the pointer, permitting reuse of dangling references.

This results in arbitrary code execution with root privileges, paving the best way for ransomware deployment like LockBit or Conti variants.

CISA emphasizes quick patching, noting that affected variations span extensively used distributions reminiscent of Ubuntu, Crimson Hat Enterprise Linux, and Debian, significantly in variations predating kernel 6.1.77.

Linux Kernel Use-After-Free Vulnerability Exploited

The vulnerability stems from a basic use-after-free error (CWE-416), the place the kernel’s netfilter subsystem mishandles desk destruction throughout rule evaluations. An attacker wants solely native execution rights, making it a potent second-stage payload after preliminary entry.

In ransomware situations, menace actors chain this with social engineering to encrypt recordsdata and exfiltrate information, demanding ransoms in cryptocurrency. Exploitation proofs-of-concept have circulated on underground boards since March 2024, with real-world assaults spiking in Q3 2025 towards healthcare and monetary sectors.

For an in depth overview, see the CVE specs under:

CVE IDDescriptionAffected Merchandise/VersionsCVSS v3.1 ScoreTechnical DetailsMitigationCVE-2024-1086Use-after-free in netfilter: nf_tables resulting in native privilege escalationLinux Kernel 7.8 (Excessive)Reminiscence deallocation flaw in nftables rule processing; requires native entry; allows root shell through dangling pointer reuseUpdate to kernel 6.1.77+; disable nf_tables if unused; apply vendor patches (e.g., Ubuntu USN-6190-1)

Organizations ought to scan environments utilizing instruments like Lynis or OpenVAS for susceptible kernels and apply mitigations per vendor steerage.

If updates are unavailable, CISA advises discontinuing use of affected merchandise. This incident highlights the dangers of legacy Linux deployments in hybrid clouds, the place attackers more and more goal open-source flaws for high-impact ransomware.

As exploitation evolves, proactive kernel hardening, reminiscent of enabling SELinux and monitoring netfilter logs, stays important to thwart these stealthy threats.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, CISA, Deploy, Exploited, Kernel, Linux, Ransomware, UseAfterFree, Vulnerability, Warns

Post navigation

Previous Post: Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
Next Post: Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

Related Posts

What Are The Takeaways from The Scattered Lapsus $Hunters Statement? Cyber Security News
FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings Cyber Security News
Breaking Down Silos Aligning IT and Security Teams Cyber Security News
Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details Cyber Security News
Aembit Introduces Identity and Access Management for Agentic AI Cyber Security News
UEFI Shell Vulnerabilities Could Allow Hackers to Bypass Secure Boot on 200,000+ Laptops Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
  • How Malicious AI Hijacks Victim Agents
  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News