{"id":25081,"date":"2022-08-17T21:20:29","date_gmt":"2022-08-17T21:20:29","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25081"},"modified":"2022-08-17T21:24:09","modified_gmt":"2022-08-17T21:24:09","slug":"linux-exploit-dirty-cred","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/","title":{"rendered":"New Linux Exploit &#8216;Dirty Cred&#8217; Revealed at Black Hat"},"content":{"rendered":"\n<p>A new Linux kernel exploitation called Dirty Cred was revealed at last week\u2019s Black Hat security conference.<\/p>\n\n\n\n<p>Zhenpeng Lin, a PhD student, and a team of researchers worked on an alternative approach to the infamous <a href=\"https:\/\/www.esecurityplanet.com\/threats\/dirty-pipe-linux-privilege-escalation\/\">Dirty Pipe vulnerability<\/a> that affected Linux kernel versions 8 and later.<\/p>\n\n\n\n<p>Dity Pipe is a major flaw that allows attackers to elevate least-privileged accounts to the maximum level (root) by exploiting the way the kernel uses pipes to pass data. Attackers can use it to modify system files and inject arbitrary code that gets executed as root on vulnerable machines.<\/p>\n\n\n\n<p>Lin&#8217;s team discovered a path to swap Linux Kernel credentials on systems vulnerable to a previously reported vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-4154\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-4154<\/a>) and a new one (<a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2022-2588\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2022-2588<\/a>), and they expect to add more compatible CVEs in the future. A public POC (proof of concept) is available on <a href=\"https:\/\/github.com\/Markakd\/DirtyCred\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a> offering an effective defense against the attack.<\/p>\n\n\n\n<p>The researchers described their approach as a generic method that can apply to <a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">containers<\/a> (unlike Dirty Pipe) and Android, and \u201cempower different bugs to be Dirty-Pipe-liked.\u201d Indeed, the generated exploit \u201ccan work on different kernels and ARCH without code change.\u201d<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/ci-cd-pipeline-software-supply-chain-risk\/\">CI\/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Dirty Cred Works<\/strong><\/h2>\n\n\n\n<p>Lin published a <a href=\"https:\/\/twitter.com\/Markak_\/status\/1556367045855412226\" target=\"_blank\" rel=\"noreferrer noopener\">demo<\/a> on Twitter that demonstrates how the approach can be used to elevate a low-privileged user on two different systems, such as Centos 8 and Ubuntu, using the same exploit code:<br><img decoding=\"async\" width=\"643\" height=\"360.56994438171387\" src=\"https:\/\/lh5.googleusercontent.com\/NlCSXgPKojq_t4L4Bg1qA7N3-66QN0zuAEWdsEZpi3ywTK-3s52jBauJW5n_PJyu-EfL48w8ErQvErFmlOI9aY9zn96nUsYyKhHjx3cyNi_xHIw-X8w9IBm1QIsX9BeFn-2wPlwqZcaV_Jovtg_Wjw\"><\/p>\n\n\n\n<p>Behind the scene, the attack is a kernel heap corruption. Because <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileged credentials<\/a> are not isolated from unprivileged ones, an attacker may attempt to swap them.<\/p>\n\n\n\n<p>There are two main types of kernel <a href=\"https:\/\/www.kernel.org\/doc\/Documentation\/security\/credentials.txt\" target=\"_blank\" rel=\"noreferrer noopener\">credentials<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>task credentials<\/li><li>open file credentials<\/li><\/ul>\n\n\n\n<p>To simplify that, let\u2019s say the kernel uses two types of objects: \u201cstruct cred\u201d and \u201cstruct file.\u201d These objects are stored in dedicated caches. The first one holds task credentials, which is information about privileges, capabilities and permissions of processes.<\/p>\n\n\n\n<p>Any attack that manages to alter such data can result in a privilege escalation. What Dirty cred does is freeing an in-use unprivileged credential to allocate a privileged one in the freed memory slot and ultimately operate as a privileged user:<\/p>\n\n\n\n<p><img decoding=\"async\" width=\"642.2017896175385\" height=\"239.05116605758667\" src=\"https:\/\/lh4.googleusercontent.com\/dZ0SvaQlX4q4tukTga3XNoXDqgxCq2bpKTZqaaLufZaQedFI46uG6ZBQJL31Lj9B6_1HsOBBzzGNySOSt3KsIVv0jgxRQ5bT93UMlYRrm1CzoKGTXOLQADPW7-CI77IWEMAiES5JssyBhHkIwl-oUw\"><\/p>\n\n\n\n<p>The attack is not perfect, though, as it has to wait for a privileged user to allocate task credentials, but it should be possible to trigger processes with root SUIDs, for example.<\/p>\n\n\n\n<p>The approach is quite the same with open file credentials and struct file objects. The attack frees a file after permission checks but before file writing to disk, which should allow the attacker to allocate a read-only file object in the memory slot and operate as a privileged user:<br><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/JE3nNhl143HBJ_ySkJoie4O6DSMay8KTGGh-xwVaXgdzzo_L6CnFF6zZBGWHRlUNeyxJ9MuvE5Lo805XayiTodp4DGyi2EhwAt_toj1QucaV7cu22ozpTYN-ki2LtotJDxzXwrNmjr48aT0YStLtRg\" width=\"622.0552353858948\" height=\"206.24692261219025\"><\/p>\n\n\n\n<p>The final step that aims to stabilize the file exploit is not the easiest to achieve. The swap has to happen between permission checks and writing to disk, which represents a very narrow time window.<\/p>\n\n\n\n<p>The researchers highlighted several solutions that consist of a pause in the kernel execution (e.g., FUSE, file lock) to extend that time window.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">Best Privileged Access Management (PAM) Software<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Protect Against Dirty Cred Attacks<\/strong><\/h2>\n\n\n\n<p>It should be noted that the POC is still in progress, even if it\u2019s already working in specific conditions, such as a specific vulnerability. <a href=\"https:\/\/github.com\/Markakd\/CVE-2021-4154\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-4154<\/a> has been patched in the Linux kernel, but the researchers indicate that \u201cthe exploit works on most Centos 8 kernels higher than linux-4.18.0-305.el8 and most buntu 20 kernels higher than 5.4.0-87.98 and 5.11.0-37.41.&#8221;<\/p>\n\n\n\n<p>Because objects are isolated according to their type and not their privileges, the researchers recommend isolating privileged credentials from unprivileged ones using virtual memory to prevent cross cache attacks.<\/p>\n\n\n\n<p>The patch is available on <a href=\"https:\/\/github.com\/Markakd\/DirtyCred\/blob\/master\/defense\/vmalloc_isolation.patch\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a> and consists of isolating task cred using <a href=\"https:\/\/www.kernel.org\/doc\/htmldocs\/kernel-api\/API-vmalloc.html\" target=\"_blank\" rel=\"noreferrer noopener\">vmalloc<\/a> (virtually contiguous memory).<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fef0478ab-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fef0478ab\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fef0478ab\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fef0478ab\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fef0478ab\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fef0478ab\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fef0478ab\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new Linux kernel exploitation called Dirty Cred was revealed at last week\u2019s Black Hat security conference. Zhenpeng Lin, a PhD student, and a team of researchers worked on an alternative approach to the infamous Dirty Pipe vulnerability that affected Linux kernel versions 8 and later. Dity Pipe is a major flaw that allows attackers [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":25083,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[15272,3414,31947,730],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,418,379],"class_list":["post-25081","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-linux-security","tag-network-security","tag-privileged-access-management","tag-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-linux-servers","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Linux Exploit &#039;Dirty Cred&#039; Revealed at Black Hat | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"A new Linux vulnerability similar to Dirty Pipe could allow hackers to gain complete control over a machine. Here&#039;s what to do.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Linux Exploit &#039;Dirty Cred&#039; Revealed at Black Hat | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"A new Linux vulnerability similar to Dirty Pipe could allow hackers to gain complete control over a machine. Here&#039;s what to do.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-17T21:20:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-17T21:24:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1022\" \/>\n\t<meta property=\"og:image:height\" content=\"381\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"New Linux Exploit &#8216;Dirty Cred&#8217; Revealed at Black Hat\",\"datePublished\":\"2022-08-17T21:20:29+00:00\",\"dateModified\":\"2022-08-17T21:24:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png\",\"keywords\":[\"Linux security\",\"network security\",\"privileged access management\",\"security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\",\"name\":\"New Linux Exploit 'Dirty Cred' Revealed at Black Hat | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png\",\"datePublished\":\"2022-08-17T21:20:29+00:00\",\"dateModified\":\"2022-08-17T21:24:09+00:00\",\"description\":\"A new Linux vulnerability similar to Dirty Pipe could allow hackers to gain complete control over a machine. Here's what to do.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png\",\"width\":1022,\"height\":381,\"caption\":\"Linux dirty cred\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Linux Exploit &#8216;Dirty Cred&#8217; Revealed at Black Hat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Linux Exploit 'Dirty Cred' Revealed at Black Hat | eSecurity Planet","description":"A new Linux vulnerability similar to Dirty Pipe could allow hackers to gain complete control over a machine. Here's what to do.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/","og_locale":"en_US","og_type":"article","og_title":"New Linux Exploit 'Dirty Cred' Revealed at Black Hat | eSecurity Planet","og_description":"A new Linux vulnerability similar to Dirty Pipe could allow hackers to gain complete control over a machine. Here's what to do.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-17T21:20:29+00:00","article_modified_time":"2022-08-17T21:24:09+00:00","og_image":[{"width":1022,"height":381,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"New Linux Exploit &#8216;Dirty Cred&#8217; Revealed at Black Hat","datePublished":"2022-08-17T21:20:29+00:00","dateModified":"2022-08-17T21:24:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png","keywords":["Linux security","network security","privileged access management","security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/","url":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/","name":"New Linux Exploit 'Dirty Cred' Revealed at Black Hat | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png","datePublished":"2022-08-17T21:20:29+00:00","dateModified":"2022-08-17T21:24:09+00:00","description":"A new Linux vulnerability similar to Dirty Pipe could allow hackers to gain complete control over a machine. Here's what to do.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/operate.png","width":1022,"height":381,"caption":"Linux dirty cred"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/linux-exploit-dirty-cred\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"New Linux Exploit &#8216;Dirty Cred&#8217; Revealed at Black Hat"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25081"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25081"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25081\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25083"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25081"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25081"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25081"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}