{"id":20642,"date":"2022-01-26T19:48:30","date_gmt":"2022-01-26T19:48:30","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20642"},"modified":"2022-01-26T19:48:30","modified_gmt":"2022-01-26T19:48:30","slug":"pwnkit-linux-flaw-hits-all-distributions","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/","title":{"rendered":"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys"},"content":{"rendered":"<p>An easily exploited flaw in a program found in every major Linux distribution is the latest serious security issue that has arisen in the <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-security-a-big-problem\/\">open-source<\/a> space in recent weeks.<\/p>\n<p>Researchers at cybersecurity vendor Qualys this week disclosed the memory corruption vulnerability in polkit\u2019s pkexec, which if exploited by a bad actor can enable an unprivileged user to gain full root privileges on a system, giving the unprivileged user administrative rights.<\/p>\n<p>The vulnerability, tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-4034\">CVE-2021-4034<\/a>, has \u201cbeen hiding in plain sight\u201d for more than 12 years and infects all versions of polkit\u2019s pkexec since it was first developed in 2009, Bharat Jogi, director of vulnerability and threat research at Qualys, wrote in a <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2022\/01\/25\/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034\">blog post<\/a>.<\/p>\n<p>Polkit\u2019s (formerly PolicyKit) pkexec is a component used to control system-wide privileges in Unix-like operating systems, enabling non-privileged processes to communicate with <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileged processes<\/a> in an organized fashion. It also can be used to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed with root permission.<\/p>\n<p>The flaw can\u2019t be exploited remotely, but if an attacker can log in as any unprivileged user, the vulnerability can be quickly exploited, according to Qualys. Red Hat rated the severity of the flaw a <a href=\"https:\/\/access.redhat.com\/security\/cve\/CVE-2021-4034\">7.8 out of 10<\/a> on the CVSS scale.<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2><strong>Every Linux Distribution is Vulnerable<\/strong><\/h2>\n<p>The pkexec component is widely used; it\u2019s installed as a default in every major Linux distribution and Qualys was able to verify the vulnerability, develop an exploit and gain full root privileges on installations of Ubuntu, Debian, Fedora and CenOS, Jogi wrote, adding that \u201cother Linux distributions are likely vulnerable and probably exploitable.\u201d<\/p>\n<p>He wrote that Qualys won\u2019t publish exploit code for the vulnerability \u2013 dubbed PwnKit \u2013 but said that \u201cgiven how easy it is to exploit the vulnerability, we anticipate public exploits to become available within a few days of this blog\u2019s post date.\u201d<\/p>\n<p>Vulnerabilities like PwnKit \u2013 which have been present for more than a decade and are ubiquitous in Linux distributions and, therefore, enterprises \u2013 pose a significant challenge for security teams, according to Greg Fitzgerald, co-founder and chief experience officer for cybersecurity firm Sevco Security. The priority for organizations should be to patch their Linux machines, but it\u2019s not an easy task.<\/p>\n<p>\u201cThat\u2019s all well and good for the machines that IT and security teams know about, but there are not many companies with an accurate IT asset inventory that dates back more than a decade,\u201d Fitzgerald told <em>eSecurity Planet<\/em>. \u201cThe unfortunate reality is that many organizations that patch all of the machines they\u2019re aware of will still be susceptible to this vulnerability because they do not have an accurate inventory of their IT assets. You can\u2019t apply a patch to an asset you don\u2019t know is on your network. Abandoned and unknown IT assets are often the path of least resistance for malicious actors trying to access your network or data.\u201d<\/p>\n<figure id=\"attachment_20646\" aria-describedby=\"caption-attachment-20646\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20646\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg\" alt=\"cybersecurity asset management\" width=\"900\" height=\"505\" \/><figcaption id=\"caption-attachment-20646\" class=\"wp-caption-text\">Qualys PwnKit detection<\/figcaption><\/figure>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\">Top IT Asset Management Tools for Security<\/a><\/p>\n<h2><strong>Patching Open-Source Systems a Challenge<\/strong><\/h2>\n<p>Bud Broomhead, CEO of cybersecurity company VIakoo, told <em>eSecurity Planet<\/em> that patching a flaw on open-source systems can be challenging for enterprises.<\/p>\n<blockquote><p>&#8216;a single open-source vulnerability can be present in multiple systems&#8217;<\/p><\/blockquote>\n<p>\u201cUnlike fully proprietary systems where a single manufacturer can issue a single patch to address a vulnerability, a single open-source vulnerability can be present in multiple systems \u2013 including proprietary ones \u2013 which then requires multiple manufacturers to separately develop, test and distribute a patch,\u201d Broomhead said. \u201cFor both the manufacturer and end user, this adds enormous time and complexity to implementing a security fix for a known vulnerability.\u201d<\/p>\n<p>Yaniv Bar-Dayan, co-founder and CEO of Vulcan Cyber, said that a vulnerability that gives root access on a Linux system is bad, but that \u201cfortunately, this vulnerability is a local exploit, which mitigates some risk.\u00a0Until patches are broadly available, SysAdmins can remove the SUID bit from pkexec \u2013 using:\u00a0# chmod 0755 \/usr\/bin\/pkexec\u00a0 &#8212; to temporarily mitigate the problem.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software<\/a><\/p>\n<h2><strong>Flaw Found in November<\/strong><\/h2>\n<p>Qualys discovered the vulnerability in November 2021 and notified Red Hat. This week the announcement of PwnKit was made in coordination with Red Hat and other distributors.<\/p>\n<p>\u201cGiven the breadth of the attack surface for this vulnerability across both Linux and non-Linux OS, Qualys recommends that users apply patches for this vulnerability immediately,\u201d Jogi wrote. \u201cWe expect vendors to release patches for this vulnerability in the short term. Qualys Patch Management can be used to deploy those patches to vulnerable assets, when available.\u201d<\/p>\n<p>The PwnKit flaw comes in the wake of other recent disclosures about security issues involving open-source software. At the top of the list is the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/iran-based-apt35-group-exploits-log4j-flaw\/\">critical remote execution flaw in Log4j<\/a> \u2013 the flaw is dubbed Log4Shell \u2013 that was revealed in December and has been targeted by state-sponsored hacking groups looking to leverage the vulnerability to stage attacks.<\/p>\n<h2><strong>In the Wake of Log4j<\/strong><\/h2>\n<p>Like polkit\u2019s pkexec, Log4j \u2013 a Java logging tool \u2013 has broad enterprise use across data centers and cloud-based services that could be exposed to the\u00a0<a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">zero-day vulnerability<\/a>. Log4j is a free and widely distributed open-source tool from the Apache Software Foundation and the flaw affects versions 2.0 through 2.14.1. Log4Shell is tracked as CVE-2021-44228.<\/p>\n<p>In addition, a report released this month by CrowdStrike found that incidents of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/attacks-escalating-against-linux-based-iot-devices\/\">malware targeting Linux-based Internet of Things (IoT) devices<\/a> grew by more than a third year-to-year in 2021, with the primary goal being to compromise the devices, pull them into botnets and use them for <a href=\"https:\/\/www.esecurityplanet.com\/products\/distributed-denial-of-service-ddos-protection-vendors\/\">distributed denial-of-service (DDoS)<\/a> attacks.<\/p>\n<p>\u201cWith various Linux builds and distributions at the heart of cloud infrastructures, mobile and IoT, it presents a massive opportunity for threat actors,\u201d a CrowdStrike researcher wrote in a blog post.<\/p>\n<h2><strong>Open Source in the Crosshairs<\/strong><\/h2>\n<p>\u201cThreat actors find open-source systems extremely attractive,\u201d Viakoo\u2019s Broomhead said. \u201cVulnerabilities that exploit open-source systems \u2013 like the recent Log4j vulnerability \u2013 require patches and updates to be developed by multiple device or system manufacturers, and threat actors are betting on some manufacturers being slow in releasing fixes and some end users being slow in updating their devices.\u201d<\/p>\n<p>He said what enterprises need is a <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\">software bill of materials<\/a> to make finding vulnerable systems easier, automated deployment of security fixes and extending the <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero-trust architecture<\/a> to IoT and operational technology (OT) systems, which \u201ccan add additional security to prevent vulnerabilities from being exploited.\u201d<\/p>\n<p>Vulcan Cyber\u2019s Bar-Dayan said the \u201copen-source software model is a two-edged blade.\u00a0On one side, everyone can look at the code and audit it to identify and patch vulnerabilities.\u00a0On the other side, threat actors can look at the code and find subtle issues that everyone else has missed.\u00a0The advantages of this model have historically outweighed the disadvantages, with many eyes on the code and patches frequently appearing very rapidly after a vulnerability comes to light.\u201d<\/p>\n<p>Improved auditing will help catch and correct vulnerabilities before they are used in the wild, and improved integration with vulnerability and patch management tools will make OSS-based systems even more secure and easy to maintain, he said.<\/p>\n<p>Also read:<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">13 Best Vulnerability Scanner Tools<\/a><\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/open-source-security-tools\/\">Top Open Source Security Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f4d0c32de-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f4d0c32de\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f4d0c32de\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f4d0c32de\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f4d0c32de\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f4d0c32de\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f4d0c32de\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>An easily exploited flaw in a program found in every major Linux distribution is the latest serious security issue that has arisen in the open-source space in recent weeks. Researchers at cybersecurity vendor Qualys this week disclosed the memory corruption vulnerability in polkit\u2019s pkexec, which if exploited by a bad actor can enable an unprivileged [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20646,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[10990,15272,23281],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31780,379],"class_list":["post-20642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-critical-vulnerabilities","tag-linux-security","tag-open-source-security","b2b_audience-awareness-and-consideration","b2b_product-patch-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Easily Exploitable Linux Flaw Exposes All Distributions: Qualys | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"An easily exploited flaw in a program found in every major Linux distribution is the latest serious open source security issue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"An easily exploited flaw in a program found in every major Linux distribution is the latest serious open source security issue.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-26T19:48:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"505\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys\",\"datePublished\":\"2022-01-26T19:48:30+00:00\",\"dateModified\":\"2022-01-26T19:48:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\"},\"wordCount\":1213,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg\",\"keywords\":[\"critical vulnerabilities\",\"Linux security\",\"open source security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\",\"name\":\"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg\",\"datePublished\":\"2022-01-26T19:48:30+00:00\",\"dateModified\":\"2022-01-26T19:48:30+00:00\",\"description\":\"An easily exploited flaw in a program found in every major Linux distribution is the latest serious open source security issue.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg\",\"width\":900,\"height\":505,\"caption\":\"Qualys PwnKit detection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys | eSecurity Planet","description":"An easily exploited flaw in a program found in every major Linux distribution is the latest serious open source security issue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/","og_locale":"en_US","og_type":"article","og_title":"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys | eSecurity Planet","og_description":"An easily exploited flaw in a program found in every major Linux distribution is the latest serious open source security issue.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/","og_site_name":"eSecurity Planet","article_published_time":"2022-01-26T19:48:30+00:00","og_image":[{"width":900,"height":505,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys","datePublished":"2022-01-26T19:48:30+00:00","dateModified":"2022-01-26T19:48:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/"},"wordCount":1213,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg","keywords":["critical vulnerabilities","Linux security","open source security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/","url":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/","name":"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg","datePublished":"2022-01-26T19:48:30+00:00","dateModified":"2022-01-26T19:48:30+00:00","description":"An easily exploited flaw in a program found in every major Linux distribution is the latest serious open source security issue.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/qualys-cybersecurity-asset-management-e1643226394707.jpg","width":900,"height":505,"caption":"Qualys PwnKit detection"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/pwnkit-linux-flaw-hits-all-distributions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Easily Exploitable Linux Flaw Exposes All Distributions: Qualys"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20642"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20642"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20646"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20642"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20642"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20642"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}