Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation

Posted on June 18, 2025June 18, 2025 By CWS

Linux customers acquired two essential safety notifications on Tuesday: a few new vulnerabilities might be chained for full root entry, and CISA warned concerning the in-the-wild exploitation of an older flaw.

Cybersecurity agency Qualys has printed particulars and proof-of-concept (PoC) code for 2 new Linux vulnerabilities that may be exploited for native privilege escalation.

One of many safety holes, tracked as CVE-2025-6018, impacts the Pluggable Authentication Modules (PAM) framework on Linux and it permits an unprivileged native attacker to raise permissions to ‘allow_active’ and invoke actions which can be usually reserved for customers who’re bodily current.

The second vulnerability, CVE-2025-6019, permits an ‘allow_active’ person to leverage the Udisks daemon (used for storage administration) and Llibblockdev (a library for low-level block-device operations) to acquire full root entry. 

CVE-2025-6018 and CVE-2025-6019 might be chained to permit an unprivileged attacker to realize full root entry on the focused system.

Qualys identified that the Udisks part is current by default on almost all Linux distributions, which makes the vulnerabilities harmful.

“Given the ubiquity of Udisks and the simplicity of the exploit, organizations should deal with this as a vital, common threat and deploy patches immediately,” Qualys warned.

Individually, CISA warned on Tuesday {that a} Linux kernel vulnerability, tracked as CVE-2023-0386, has been exploited in assaults. Commercial. Scroll to proceed studying.

The cybersecurity company added the flaw, which impacts the Linux kernel’s OverlayFS subsystem and permits a neighborhood attacker to escalate privileges, to its Identified Exploited Vulnerabilities (KEV) catalog. 

There don’t seem like any public reviews describing exploitation of CVE-2023-0386.

CVE-2023-0386 is considered one of two vulnerabilities disclosed in 2023 which can be collectively tracked as GameOver(lay). Researchers warned on the time that the failings are simple to take advantage of they usually had impacted 40% of Ubuntu cloud workloads. PoC code and technical particulars have been made out there shortly after disclosure.

Greater than 20 Linux kernel vulnerabilities are at present in CISA’s KEV catalog, together with a number of added final yr.  

There are few reviews describing assaults involving the exploitation of Linux kernel flaws, however they’re usually leveraged in malware assaults.

Associated: Enhanced Model of ‘BPFDoor’ Linux Backdoor Seen within the Wild

Associated: New ‘Auto-Shade’ Linux Malware Targets North America, Asia

Associated: Stealthy ‘Perfctl’ Malware Infects 1000’s of Linux Servers

Security Week News Tags:Access, Bug, CISA, Exploitation, Flaws, Linux, Root, Security, Warns

Post navigation

Previous Post: BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral
Next Post: System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools

Related Posts

Over  Million in Prizes Offered at Pwn2Own Automotive 2026 Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026 Security Week News
Blackbird.AI Raises  Million for Narrative Intelligence Platform Blackbird.AI Raises $28 Million for Narrative Intelligence Platform Security Week News
Police in Brazil Arrest a Suspect Over 0M Banking Hack Police in Brazil Arrest a Suspect Over $100M Banking Hack Security Week News
Dropzone AI Raises  Million for Autonomous SOC Analyst Dropzone AI Raises $37 Million for Autonomous SOC Analyst Security Week News
Workday Data Breach Bears Signs of Widespread Salesforce Hack Workday Data Breach Bears Signs of Widespread Salesforce Hack Security Week News
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark