Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

Posted on June 2, 2025June 2, 2025 By CWS

Two crucial native information-disclosure vulnerabilities affecting thousands and thousands of Linux techniques worldwide, probably permitting attackers to extract delicate password information by means of core dump manipulation.

The Qualys Risk Analysis Unit (TRU) disclosed two race-condition vulnerabilities that focus on core dump handlers on main Linux distributions. The primary vulnerability, CVE-2025-5054, impacts Ubuntu’s Apport crash reporting system, whereas the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used throughout Purple Hat Enterprise Linux 9 and 10, in addition to Fedora distributions.

Each vulnerabilities exploit race situations that permit native attackers to govern SUID (Set Person ID) applications and acquire unauthorized learn entry to ensuing core dumps.

Qualys researchers have developed proof-of-concept exploits demonstrating how attackers can goal the unix_chkpwd course of—a regular element for password verification put in by default on most Linux distributions to extract password hashes.

Core dump handlers like systemd-coredump and Apport routinely seize reminiscence snapshots when applications crash, creating potential goldmines of delicate info, together with passwords, encryption keys, and buyer information.

Whereas these instruments implement safety measures like limiting entry to root customers and storing dumps in safe places, the newly found race situations circumvent these protections.

Vital Linux Vulnerabilities Expose Password Hashes

The vulnerabilities have an effect on a broad vary of techniques. Ubuntu 24.04 and all Ubuntu releases since 16.04 are susceptible by means of Apport variations as much as 2.33.0.

In the meantime, Fedora 40/41 and Purple Hat Enterprise Linux 9 and 10 face publicity by means of systemd-coredump. Notably, Debian techniques stay protected by default since they don’t embrace core dump handlers except manually put in.

The potential affect extends past easy information publicity. Organizations face dangers of operational downtime, reputational harm, and regulatory compliance violations. The flexibility to extract password hashes may allow attackers to escalate privileges and transfer laterally throughout compromised networks.

Safety consultants advocate instantly implementing a crucial mitigation: setting the /proc/sys/fs/suid_dumpable parameter to 0. This configuration change disables core dumps for all SUID applications, successfully neutralizing the assault vector whereas organizations await official patches.

“Whereas this modification will disable some debugging capabilities for SUID applications and root daemons, it serves as a vital short-term repair when susceptible core dump handlers can’t be patched instantly,” safety researchers famous.

Qualys additionally developed totally examined mitigation scripts, permitting organizations to quickly neutralize the menace. Nevertheless, Qualys warns that broad implementation might introduce operational dangers and recommends thorough testing in managed environments.

This discovery underscores the crucial significance of proactive vulnerability administration and the necessity for sturdy mitigation methods when patches aren’t instantly obtainable.

Organizations ought to prioritize updating their core dump handlers whereas implementing the advisable short-term mitigations to guard towards potential exploitation.

Stay Credential Theft Assault Unmask & Immediate Protection – Free Webinar

Cyber Security News Tags:Critical, Expose, Hashes, Linux, Millions, Password, Systems, Vulnerabilities, Worldwide

Post navigation

Previous Post: Penetration Testing in the AI Era Tools and Techniques
Next Post: Breaking Down Silos Aligning IT and Security Teams

Related Posts

New EDR-Freeze Tool That Puts EDRs And Antivirus Into A Coma State New EDR-Freeze Tool That Puts EDRs And Antivirus Into A Coma State Cyber Security News
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Cyber Security News
World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison Cyber Security News
OpenVPN Vulnerabilities Let Hackers Triggers Dos Attack and Bypass Security Checks OpenVPN Vulnerabilities Let Hackers Triggers Dos Attack and Bypass Security Checks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark