Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

Posted on June 2, 2025June 2, 2025 By CWS

Two crucial native information-disclosure vulnerabilities affecting thousands and thousands of Linux techniques worldwide, probably permitting attackers to extract delicate password information by means of core dump manipulation.

The Qualys Risk Analysis Unit (TRU) disclosed two race-condition vulnerabilities that focus on core dump handlers on main Linux distributions. The primary vulnerability, CVE-2025-5054, impacts Ubuntu’s Apport crash reporting system, whereas the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used throughout Purple Hat Enterprise Linux 9 and 10, in addition to Fedora distributions.

Each vulnerabilities exploit race situations that permit native attackers to govern SUID (Set Person ID) applications and acquire unauthorized learn entry to ensuing core dumps.

Qualys researchers have developed proof-of-concept exploits demonstrating how attackers can goal the unix_chkpwd course of—a regular element for password verification put in by default on most Linux distributions to extract password hashes.

Core dump handlers like systemd-coredump and Apport routinely seize reminiscence snapshots when applications crash, creating potential goldmines of delicate info, together with passwords, encryption keys, and buyer information.

Whereas these instruments implement safety measures like limiting entry to root customers and storing dumps in safe places, the newly found race situations circumvent these protections.

Vital Linux Vulnerabilities Expose Password Hashes

The vulnerabilities have an effect on a broad vary of techniques. Ubuntu 24.04 and all Ubuntu releases since 16.04 are susceptible by means of Apport variations as much as 2.33.0.

In the meantime, Fedora 40/41 and Purple Hat Enterprise Linux 9 and 10 face publicity by means of systemd-coredump. Notably, Debian techniques stay protected by default since they don’t embrace core dump handlers except manually put in.

The potential affect extends past easy information publicity. Organizations face dangers of operational downtime, reputational harm, and regulatory compliance violations. The flexibility to extract password hashes may allow attackers to escalate privileges and transfer laterally throughout compromised networks.

Safety consultants advocate instantly implementing a crucial mitigation: setting the /proc/sys/fs/suid_dumpable parameter to 0. This configuration change disables core dumps for all SUID applications, successfully neutralizing the assault vector whereas organizations await official patches.

“Whereas this modification will disable some debugging capabilities for SUID applications and root daemons, it serves as a vital short-term repair when susceptible core dump handlers can’t be patched instantly,” safety researchers famous.

Qualys additionally developed totally examined mitigation scripts, permitting organizations to quickly neutralize the menace. Nevertheless, Qualys warns that broad implementation might introduce operational dangers and recommends thorough testing in managed environments.

This discovery underscores the crucial significance of proactive vulnerability administration and the necessity for sturdy mitigation methods when patches aren’t instantly obtainable.

Organizations ought to prioritize updating their core dump handlers whereas implementing the advisable short-term mitigations to guard towards potential exploitation.

Stay Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:Critical, Expose, Hashes, Linux, Millions, Password, Systems, Vulnerabilities, Worldwide

Post navigation

Previous Post: Penetration Testing in the AI Era Tools and Techniques
Next Post: Breaking Down Silos Aligning IT and Security Teams

Related Posts

Russian Hackers Leverage Oracle Cloud Infrastructure to Scaleway Object Storage Cyber Security News
Threat Actors Leverage Google Apps Script To Host Phishing Websites Cyber Security News
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code Cyber Security News
Incident Response Planning – Preparing for Data Breaches Cyber Security News
Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users Cyber Security News
SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News