Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

Posted on June 2, 2025June 2, 2025 By CWS

Two crucial native information-disclosure vulnerabilities affecting thousands and thousands of Linux techniques worldwide, probably permitting attackers to extract delicate password information by means of core dump manipulation.

The Qualys Risk Analysis Unit (TRU) disclosed two race-condition vulnerabilities that focus on core dump handlers on main Linux distributions. The primary vulnerability, CVE-2025-5054, impacts Ubuntu’s Apport crash reporting system, whereas the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used throughout Purple Hat Enterprise Linux 9 and 10, in addition to Fedora distributions.

Each vulnerabilities exploit race situations that permit native attackers to govern SUID (Set Person ID) applications and acquire unauthorized learn entry to ensuing core dumps.

Qualys researchers have developed proof-of-concept exploits demonstrating how attackers can goal the unix_chkpwd course of—a regular element for password verification put in by default on most Linux distributions to extract password hashes.

Core dump handlers like systemd-coredump and Apport routinely seize reminiscence snapshots when applications crash, creating potential goldmines of delicate info, together with passwords, encryption keys, and buyer information.

Whereas these instruments implement safety measures like limiting entry to root customers and storing dumps in safe places, the newly found race situations circumvent these protections.

Vital Linux Vulnerabilities Expose Password Hashes

The vulnerabilities have an effect on a broad vary of techniques. Ubuntu 24.04 and all Ubuntu releases since 16.04 are susceptible by means of Apport variations as much as 2.33.0.

In the meantime, Fedora 40/41 and Purple Hat Enterprise Linux 9 and 10 face publicity by means of systemd-coredump. Notably, Debian techniques stay protected by default since they don’t embrace core dump handlers except manually put in.

The potential affect extends past easy information publicity. Organizations face dangers of operational downtime, reputational harm, and regulatory compliance violations. The flexibility to extract password hashes may allow attackers to escalate privileges and transfer laterally throughout compromised networks.

Safety consultants advocate instantly implementing a crucial mitigation: setting the /proc/sys/fs/suid_dumpable parameter to 0. This configuration change disables core dumps for all SUID applications, successfully neutralizing the assault vector whereas organizations await official patches.

“Whereas this modification will disable some debugging capabilities for SUID applications and root daemons, it serves as a vital short-term repair when susceptible core dump handlers can’t be patched instantly,” safety researchers famous.

Qualys additionally developed totally examined mitigation scripts, permitting organizations to quickly neutralize the menace. Nevertheless, Qualys warns that broad implementation might introduce operational dangers and recommends thorough testing in managed environments.

This discovery underscores the crucial significance of proactive vulnerability administration and the necessity for sturdy mitigation methods when patches aren’t instantly obtainable.

Organizations ought to prioritize updating their core dump handlers whereas implementing the advisable short-term mitigations to guard towards potential exploitation.

Stay Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:Critical, Expose, Hashes, Linux, Millions, Password, Systems, Vulnerabilities, Worldwide

Post navigation

Previous Post: Penetration Testing in the AI Era Tools and Techniques
Next Post: Breaking Down Silos Aligning IT and Security Teams

Related Posts

New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer Cyber Security News
Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Cyber Security News
NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls Cyber Security News
Hackers Actively Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells Cyber Security News
Google to Remove Two Certificate Authorities from Chrome Root Store Cyber Security News
GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
  • Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
  • Critical Apache Tika Vulnerability Leads to XXE Injection
  • Exploitation of React2Shell Surges – SecurityWeek
  • Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
  • Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
  • Critical Apache Tika Vulnerability Leads to XXE Injection
  • Exploitation of React2Shell Surges – SecurityWeek
  • Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark