{"id":21780,"date":"2022-04-28T21:54:01","date_gmt":"2022-04-28T21:54:01","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21780"},"modified":"2022-04-28T21:54:01","modified_gmt":"2022-04-28T21:54:01","slug":"nimbuspwn-root-privilege-escalation-linux","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/","title":{"rendered":"Nimbuspwn: New Root Privilege Escalation Found in Linux"},"content":{"rendered":"<p>The Microsoft 365 Defender Research Team has <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/04\/26\/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn\/\" target=\"_blank\" rel=\"noopener\">revealed<\/a> several new Linux vulnerabilities collectively dubbed &#8220;Nimbuspwn.&#8221; Like the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\">Dirty Pipe vulnerability<\/a>, they only need a local user with low capabilities to elevate privileges, but this time the exploit seems much more specific and focuses on \u201cnetworkd-dispatcher,\u201d a systemd component that handles connection status changes.<\/p>\n<p>The Nimbuspwn collection of vulnerabilities is recorded as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-29799\" target=\"_blank\" rel=\"noopener\">CVE-2022-29799<\/a> (Directory Traversal) and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-29800\" target=\"_blank\" rel=\"noopener\">CVE-2022-29800<\/a> (TOCTOU race conditions). The researchers found that the logic implemented in the networkd-dispatcher component does not sanitize critical elements used to build the script path, which could be exploited to escape the \/etc\/networkd-dispatcher\/ directory.<\/p>\n<p>In addition, the Microsoft researchers discovered a dangerous delay (hence the TOCTOU, time-of-check-time-of-use) between the scripts being discovered by the component and the time they&#8217;re actually run. Hackers could exploit such intervals to replace the scripts with their own.<\/p>\n<p>The researchers concluded attackers might use these vulnerabilities to send an arbitrary signal. It\u2019s possible only under specific conditions, but they can make networkd-dispatcher execute some scripts blindly and as root. Attackers may use it to perform additional tasks such as distributing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> or deploying <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a>.<\/p>\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-vulnerability-scanners\/\">Top 10 Open Source Vulnerability Assessment Tools<\/a><\/p>\n<h2><strong>Nimbuspwn Exploit Steps<\/strong><\/h2>\n<p>The Microsoft researchers described all the steps in a very explanatory schema (image below) that shows how attackers could chain the exploits to divert networkd-dispatcher and gain root privileges:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21782\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages.png\" alt=\"Nimbuspwn\" width=\"800\" height=\"996\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages.png 800w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages-241x300.png 241w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages-768x956.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages-150x187.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages-300x374.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-5-Flow-chart-of-the-attack-in-three-stages-696x867.png 696w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h3 role=\"presentation\"><strong>Daemons and D-Bus<\/strong><\/h3>\n<p>To understand how Nimbuspwn works, you need a basic overview of the Linux components involved, like daemons and buses.<\/p>\n<p>Daemons are utility programs that run in the background to monitor and maintain some subsystems. They execute very specific actions at predefined times or they trigger for some events. Every time you see a process that ends with the letter d, it\u2019s a daemon. You can test it with the ps command or by using built-in utilities such as <em>top<\/em>.<\/p>\n<p>So \u201cnetworkd\u201d means \u201cnetwork daemon,\u201d and researchers were intrigued by the fact that the networkd-dispatcher daemon runs at boot time with root privileges on the system. If you have the component, you can verify that with the following command in the terminal:<\/p>\n<pre>ps -U root -u root u | grep networkd-dispatcher\r\n<\/pre>\n<p>D-Bus stands for \u201cDesktop Bus\u201d and allows communications between processes. This mechanism is developed by the freedesktop project and provides the necessary abstraction (or \u201csoftware bus\u201d, a model that facilitates communications between software modules) to guarantee that all processes connected to the bus can communicate with each other efficiently.<\/p>\n<p>Linux systems (e.g., desktop environments) use D-Bus to instantiate multiple buses, including a single system bus available to all users and processes of the system, that provide access to system services.<\/p>\n<p>Because system services owned by root\u00a0 are listening and responding to the system bus, it\u2019s an attractive target for hackers.<\/p>\n<h3 role=\"presentation\"><strong>Owning the org.freedesktop.network1 bus<\/strong><\/h3>\n<p>To achieve their exploit, researchers had to own the org.freedesktop.network1 bus name under a privileged service:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21783\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png\" alt=\"Nimbuspwn exploit\" width=\"800\" height=\"598\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png 800w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race-300x224.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race-768x574.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race-150x112.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race-696x520.png 696w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Such a bus name is normally owned by the service systemd-networkd, but hackers can change that if they manage to get a rogue D-Bus.<\/p>\n<p>These vulnerabilities may seem a bit hard to chain and exploit, and the researchers needed to plant multiple files and make several attempts to win the TOCTOU race condition. However, they delivered a backdoor using Nimbuspwn, which allowed them to skip the exploit when they wanted to use root commands again.<\/p>\n<p>Any vulnerability that allows root privilege escalation should be taken seriously, regardless of difficulty to exploit.<\/p>\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2 role=\"presentation\"><strong>How to Protect Against Nimbuspwn<\/strong><\/h2>\n<p>At the time of writing, there\u2019s no official list of affected environments and distributions but the Microsoft Research Team mentioned Linux Mint, a light distribution based on Ubuntu, a Debian-based operating system and possibly the most popular Linux distro.<\/p>\n<p>A <a href=\"https:\/\/pkgs.org\/search\/?q=networkd-dispatcher\" target=\"_blank\" rel=\"noopener\">quick search<\/a> might help you identify all distributions that could have the vulnerable component. Clayton Craft, the maintainer of networkd-dispatcher, has patched the vulnerabilities, so if you have the component enabled, you are strongly encouraged to update.<\/p>\n<p>However, and it&#8217;s good news in this case, the component might not be installed by default in all distributions. You might check it manually but there\u2019s already <a href=\"https:\/\/github.com\/jfrog\/nimbuspwn-tools\" target=\"_blank\" rel=\"noopener\">a free open source detector<\/a> available on GitHub that will check if the process is currently running on your system.<\/p>\n<p>More generally, Nimbuspwn shows how important it is to monitor all <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\">endpoints<\/a>, including Linux devices. There\u2019s a growing number of vulnerabilities and exploits in Linux systems and components, and it won\u2019t stop soon, as Linux is prevalent in many cloud-based architectures and servers.<\/p>\n<p>To me, the major problem with such flaws is that they&#8217;re often underestimated, mainly because they require a local user, so hackers need to be already in a machine to exploit them. It\u2019s not a valid reason to neglect the risk, as lateral movements and privilege escalations are now part of the hacker\u2019s routine.<\/p>\n<p>You can\u2019t rely on only one layer of security, and companies need to prepare for post-exploitation techniques.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection &amp; Response (EDR) Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fe7561330-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fe7561330\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fe7561330\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fe7561330\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fe7561330\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fe7561330\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fe7561330\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft 365 Defender Research Team has revealed several new Linux vulnerabilities collectively dubbed &#8220;Nimbuspwn.&#8221; Like the Dirty Pipe vulnerability, they only need a local user with low capabilities to elevate privileges, but this time the exploit seems much more specific and focuses on \u201cnetworkd-dispatcher,\u201d a systemd component that handles connection status changes. The Nimbuspwn [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[10990,15272],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,31780],"class_list":["post-21780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-critical-vulnerabilities","tag-linux-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nimbuspwn: New Root Privilege Escalation Found in Linux | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Security researchers have identified a new critical Linux vulnerability. Here&#039;s how it works - and what to do about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nimbuspwn: New Root Privilege Escalation Found in Linux | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Security researchers have identified a new critical Linux vulnerability. Here&#039;s how it works - and what to do about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-28T21:54:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"598\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Nimbuspwn: New Root Privilege Escalation Found in Linux\",\"datePublished\":\"2022-04-28T21:54:01+00:00\",\"dateModified\":\"2022-04-28T21:54:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\"},\"wordCount\":846,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png\",\"keywords\":[\"critical vulnerabilities\",\"Linux security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\",\"name\":\"Nimbuspwn: New Root Privilege Escalation Found in Linux | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png\",\"datePublished\":\"2022-04-28T21:54:01+00:00\",\"dateModified\":\"2022-04-28T21:54:01+00:00\",\"description\":\"Security researchers have identified a new critical Linux vulnerability. Here's how it works - and what to do about it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png\",\"width\":800,\"height\":598,\"caption\":\"Nimbuspwn exploit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nimbuspwn: New Root Privilege Escalation Found in Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nimbuspwn: New Root Privilege Escalation Found in Linux | eSecurity Planet","description":"Security researchers have identified a new critical Linux vulnerability. Here's how it works - and what to do about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/","og_locale":"en_US","og_type":"article","og_title":"Nimbuspwn: New Root Privilege Escalation Found in Linux | eSecurity Planet","og_description":"Security researchers have identified a new critical Linux vulnerability. Here's how it works - and what to do about it.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/","og_site_name":"eSecurity Planet","article_published_time":"2022-04-28T21:54:01+00:00","og_image":[{"width":800,"height":598,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Nimbuspwn: New Root Privilege Escalation Found in Linux","datePublished":"2022-04-28T21:54:01+00:00","dateModified":"2022-04-28T21:54:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/"},"wordCount":846,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png","keywords":["critical vulnerabilities","Linux security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/","url":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/","name":"Nimbuspwn: New Root Privilege Escalation Found in Linux | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png","datePublished":"2022-04-28T21:54:01+00:00","dateModified":"2022-04-28T21:54:01+00:00","description":"Security researchers have identified a new critical Linux vulnerability. Here's how it works - and what to do about it.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Figure-6-Our-exploit-implemented-and-winning-the-TOCTOU-race.png","width":800,"height":598,"caption":"Nimbuspwn exploit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/nimbuspwn-root-privilege-escalation-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Nimbuspwn: New Root Privilege Escalation Found in Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21780"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21780"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21780\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21783"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21780"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21780"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21780"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}