Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Critical Linux Vulnerabilities: PAM and Udisks Exploits Grant Root Access

by Jane Doe
June 19, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

Cybersecurity researchers have unveiled two severe local privilege escalation (LPE) vulnerabilities in widely used Linux components, Pluggable Authentication Modules (PAM) and Udisks, which can be chained to grant an unprivileged attacker full root access on major Linux distributions.

These flaws, identified as CVE-2025-6018 (PAM) and CVE-2025-6019 (Udisks/libblockdev), pose a significant threat to countless Linux systems globally.

Discovered by the Qualys Threat Research Unit (TRU), the exploit chain demonstrates a rapid path from an ordinary logged-in user, even via an SSH session, to a complete system takeover.

The first vulnerability, CVE-2025-6018, primarily affects the PAM configuration in openSUSE Leap 15 and SUSE Linux Enterprise 15. This misconfiguration allows an unprivileged local attacker to elevate their privileges to “allow_active,” a status typically reserved for physically present users, thereby enabling them to invoke privileged Polkit actions.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

The second and equally critical vulnerability, CVE-2025-6019, resides in libblockdev and is exploitable via the udisks daemon. The udisks daemon, which is installed by default on almost all Linux distributions, is responsible for managing disks and storage devices.

This flaw permits an “allow_active” user to gain full root privileges by manipulating mount options when resizing certain file systems.

The danger of these vulnerabilities lies in their chaining. While CVE-2025-6019 nominally requires “allow_active” privileges, the PAM flaw (CVE-2025-6018) provides exactly that, effectively creating a direct, low-effort path to root access.

Qualys TRU has successfully demonstrated proof-of-concept exploits on various operating systems, including Ubuntu, Debian, Fedora, and openSUSE Leap 15, highlighting the broad impact of these issues.

Upon obtaining root privileges, attackers gain carte blanche access to the compromised system, allowing for extensive post-compromise actions such as altering security controls, implanting backdoors for persistent access, and initiating broader fleet-wide compromises through lateral movement.

Linux distribution vendors are urged to release and users are strongly advised to apply patches immediately. As temporary mitigation, administrators can modify the Polkit rule for “org.freedesktop.udisks2.modify-device” to require administrator authentication (“auth_admin”) instead of simply “allow_active” status. This chained exploit underscores the continuous need for vigilant patch management and robust security practices in Linux environments.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

June 23, 2025
Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.