Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

Posted on June 18, 2025June 18, 2025 By CWS

Jun 18, 2025Ravie LakshmananLinux / Vulnerability
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday positioned a safety flaw impacting the Linux kernel in its Identified Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited within the wild.
The vulnerability, CVE-2023-0386 (CVSS rating: 7.8), is an improper possession bug within the Linux kernel that might be exploited to escalate privileges on inclined techniques. It was patched in early 2023.
“Linux kernel accommodates an improper possession administration vulnerability, the place unauthorized entry to the execution of the setuid file with capabilities was discovered within the Linux kernel’s OverlayFS subsystem in how a consumer copies a succesful file from a nosuid mount into one other mount,” the company stated.

“This uid mapping bug permits a neighborhood consumer to escalate their privileges on the system.”
It is at the moment not identified how the safety flaw is being exploited within the wild. In a report revealed in Might 2023, Datadog stated the vulnerability is trivial to take advantage of and that it really works by tricking the kernel into making a SUID binary owned by root in a folder like “/tmp” and executing it.

“CVE-2023-0386 lies in the truth that when the kernel copied a file from the overlay file system to the ‘higher’ listing, it didn’t examine if the consumer/group proudly owning this file was mapped within the present consumer namespace,” the corporate stated.
“This enables an unprivileged consumer to smuggle an SUID binary from a ‘decrease’ listing to the ‘higher’ listing, through the use of OverlayFS as an middleman.”
Later that 12 months, cloud safety agency Wiz detailed two safety vulnerabilities dubbed GameOver(lay) (CVE-2023-32629 and CVE-2023-2640) affecting Unix techniques that led to comparable penalties as CVE-2023-0386.
“These flaws permit the creation of specialised executables, which, upon execution, grant the flexibility to escalate privileges to root on the affected machine,” Wiz researchers stated.
Federal Civilian Government Department (FCEB) businesses are required to use the required patches by July 8, 2025, to safe their networks in opposition to energetic threats.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Active, CISA, Escalation, Exploitation, Kernel, Linux, Privilege, Vulnerability, Warns

Post navigation

Previous Post: Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents
Next Post: Data Breach at Healthcare Services Firm Episource Impacts 5.4 Million People

Related Posts

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware The Hacker News
RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities The Hacker News
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed The Hacker News
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit The Hacker News
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud The Hacker News
DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark