Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

Posted on November 1, 2025November 1, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued an pressing alert a few essential use-after-free vulnerability within the Linux kernel, tracked as CVE-2024-1086.

This vulnerability, hidden throughout the netfilter: nf_tables part, permits native attackers to escalate their privileges and probably deploy ransomware, which might severely disrupt enterprise methods worldwide.

First disclosed earlier this yr, the vulnerability has now been linked to lively exploitation campaigns focusing on unpatched Linux servers, in accordance with CISA’s Recognized Exploited Vulnerabilities (KEV) catalog up to date on October 31, 2025.

As Linux powers every little thing from cloud infrastructure to IoT gadgets, this warning underscores the rising menace to open-source ecosystems amid rising ransomware incidents.

Safety researchers have confirmed that attackers exploit CVE-2024-1086 by crafting malicious netfilter guidelines that set off improper reminiscence deallocation. As soon as a person with native entry typically gained by phishing or weak credentials runs the exploit, the system frees reminiscence related to a community desk however fails to nullify the pointer, permitting reuse of dangling references.

This results in arbitrary code execution with root privileges, paving the best way for ransomware deployment like LockBit or Conti variants.

CISA emphasizes quick patching, noting that affected variations span extensively used distributions reminiscent of Ubuntu, Crimson Hat Enterprise Linux, and Debian, significantly in variations predating kernel 6.1.77.

Linux Kernel Use-After-Free Vulnerability Exploited

The vulnerability stems from a basic use-after-free error (CWE-416), the place the kernel’s netfilter subsystem mishandles desk destruction throughout rule evaluations. An attacker wants solely native execution rights, making it a potent second-stage payload after preliminary entry.

In ransomware situations, menace actors chain this with social engineering to encrypt recordsdata and exfiltrate information, demanding ransoms in cryptocurrency. Exploitation proofs-of-concept have circulated on underground boards since March 2024, with real-world assaults spiking in Q3 2025 towards healthcare and monetary sectors.

For an in depth overview, see the CVE specs under:

CVE IDDescriptionAffected Merchandise/VersionsCVSS v3.1 ScoreTechnical DetailsMitigationCVE-2024-1086Use-after-free in netfilter: nf_tables resulting in native privilege escalationLinux Kernel 7.8 (Excessive)Reminiscence deallocation flaw in nftables rule processing; requires native entry; allows root shell through dangling pointer reuseUpdate to kernel 6.1.77+; disable nf_tables if unused; apply vendor patches (e.g., Ubuntu USN-6190-1)

Organizations ought to scan environments utilizing instruments like Lynis or OpenVAS for susceptible kernels and apply mitigations per vendor steerage.

If updates are unavailable, CISA advises discontinuing use of affected merchandise. This incident highlights the dangers of legacy Linux deployments in hybrid clouds, the place attackers more and more goal open-source flaws for high-impact ransomware.

As exploitation evolves, proactive kernel hardening, reminiscent of enabling SELinux and monitoring netfilter logs, stays important to thwart these stealthy threats.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, CISA, Deploy, Exploited, Kernel, Linux, Ransomware, UseAfterFree, Vulnerability, Warns

Post navigation

Previous Post: Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
Next Post: Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

Related Posts

Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More Cyber Security News
PylangGhost RAT Targets Developers via npm Packages PylangGhost RAT Targets Developers via npm Packages Cyber Security News
CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks Cyber Security News
Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency Cyber Security News
Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code Cyber Security News
Securing IoT Devices in the Enterprise Challenges and Solutions Securing IoT Devices in the Enterprise Challenges and Solutions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark