acretonet.com Open in urlscan Pro
2600:1f18:66:9201:7374:23e4:8bdf:1a8c  Public Scan

Submitted URL: http://email.acretonet.com/c/eJx00MvOrCgUBeCnsYaG-2Xg4O9U16BfogMICoWggJb69J1KOjk5gzPayV5f1mCNg3SEodE-7ACZoFJyLsRjHiRTXBOotS...
Effective URL: https://acretonet.com/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson%20Eric&siq_email=eric.johnson@lgf...
Submission: On July 29 via api from US — Scanned from DE

Form analysis 7 forms found in the DOM

GET https://acretonet.com/

<form role="search" method="get" class="search-form" action="https://acretonet.com/" siq_id="autopick_6222">
  <input type="search" class="search-field" placeholder="Search Blog" value="" name="s">
  <button type="submit" class="search-submit"><i class="fa fa-search"></i></button>
</form>

POST /new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&siq_email=eric.johnson%40lgfcu.org#wpcf7-f1162-o1

<form action="/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&amp;siq_email=eric.johnson%40lgfcu.org#wpcf7-f1162-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init"
  siq_id="autopick_5312">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="1162">
    <input type="hidden" name="_wpcf7_version" value="5.7.7">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1162-o1">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="input-holder">
    <p><label for="contact-name">Full Name<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="contact-name" aria-required="true" aria-invalid="false" value="" type="text"
          name="your-name"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="contact-email">Business e-mail<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control" id="contact-email" aria-required="true"
          aria-invalid="false" value="" type="email" name="your-email"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="contact-business">Organization Name<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="business"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="contact-business" aria-required="true" aria-invalid="false" value="" type="text"
          name="business"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea form-control" aria-invalid="false" placeholder="Message" name="your-message"></textarea></span>
    </p>
  </div>
  <div class="text-center">
    <p><input class="wpcf7-form-control has-spinner wpcf7-submit btn button" type="submit" value="Submit"><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST /new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&siq_email=eric.johnson%40lgfcu.org#wpcf7-f626-o2

<form action="/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&amp;siq_email=eric.johnson%40lgfcu.org#wpcf7-f626-o2" method="post" class="wpcf7-form subscribe-footer-form init" aria-label="Contact form" novalidate="novalidate"
  data-status="init" siq_id="autopick_1073">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="626">
    <input type="hidden" name="_wpcf7_version" value="5.7.7">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f626-o2">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="sign-up-box">
    <p><span class="wpcf7-form-control-wrap" data-name="email-958"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control" aria-required="true" aria-invalid="false"
          placeholder="Email*" value="" type="email" name="email-958"></span><br>
      <input class="wpcf7-form-control has-spinner wpcf7-submit btn button" type="submit" value="Submit"><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST /new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&siq_email=eric.johnson%40lgfcu.org#wpcf7-f5-o3

<form action="/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&amp;siq_email=eric.johnson%40lgfcu.org#wpcf7-f5-o3" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init"
  siq_id="autopick_2980">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="5">
    <input type="hidden" name="_wpcf7_version" value="5.7.7">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f5-o3">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="input-holder">
    <p><label for="request-demo-name">Full Name<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="request-demo-name" aria-required="true" aria-invalid="false" value="" type="text"
          name="your-name"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="request-demo-email">Email<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control" id="request-demo-email" aria-required="true"
          aria-invalid="false" value="" type="email" name="your-email"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="request-demo-business">Organization Name</label><br>
      <span class="wpcf7-form-control-wrap" data-name="business"><input size="40" class="wpcf7-form-control wpcf7-text form-control" id="request-demo-business" aria-invalid="false" value="" type="text" name="business"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea form-control" aria-invalid="false" placeholder="Message" name="your-message"></textarea></span>
    </p>
  </div>
  <div class="text-center">
    <p><input class="wpcf7-form-control has-spinner wpcf7-submit btn button" type="submit" value="Submit"><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST /new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&siq_email=eric.johnson%40lgfcu.org#wpcf7-f517-o4

<form action="/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&amp;siq_email=eric.johnson%40lgfcu.org#wpcf7-f517-o4" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init"
  siq_id="autopick_4548">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="517">
    <input type="hidden" name="_wpcf7_version" value="5.7.7">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f517-o4">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="input-holder">
    <p><label for="solution-brief-name">Full Name<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="solution-brief-name" aria-required="true" aria-invalid="false" value="" type="text"
          name="your-name"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="solution-brief-email">Email<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control" id="solution-brief-email" aria-required="true"
          aria-invalid="false" value="" type="email" name="your-email"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="solution-brief-business">Organization Name</label><br>
      <span class="wpcf7-form-control-wrap" data-name="business"><input size="40" class="wpcf7-form-control wpcf7-text form-control" id="solution-brief-business" aria-invalid="false" value="" type="text" name="business"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea form-control" aria-invalid="false" placeholder="Message" name="your-message"></textarea></span>
    </p>
  </div>
  <div class="text-center">
    <p><input class="wpcf7-form-control has-spinner wpcf7-submit btn button" type="submit" value="Submit"><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST /new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&siq_email=eric.johnson%40lgfcu.org#wpcf7-f506-o5

<form action="/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&amp;siq_email=eric.johnson%40lgfcu.org#wpcf7-f506-o5" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init"
  siq_id="autopick_4001">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="506">
    <input type="hidden" name="_wpcf7_version" value="5.7.7">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f506-o5">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="input-holder">
    <p><label for="button-dialog-name">Full Name<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="button-dialog-name" aria-required="true" aria-invalid="false" value="" type="text"
          name="your-name"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="button-dialog-email">Email<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control" id="button-dialog-email" aria-required="true"
          aria-invalid="false" value="" type="email" name="your-email"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="button-dialog-business">Organization Name</label><br>
      <span class="wpcf7-form-control-wrap" data-name="business"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="button-dialog-business" aria-required="true" aria-invalid="false" value=""
          type="text" name="business"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea form-control" aria-invalid="false" placeholder="Message" name="your-message"></textarea></span>
    </p>
  </div>
  <div class="text-center">
    <p><input class="wpcf7-form-control has-spinner wpcf7-submit btn button" type="submit" value="Submit"><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST /new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&siq_email=eric.johnson%40lgfcu.org#wpcf7-f541-o6

<form action="/new-linux-vulnerabilities-actively-exploited/?siq_name=Johnson+Eric&amp;siq_email=eric.johnson%40lgfcu.org#wpcf7-f541-o6" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init"
  siq_id="autopick_2147">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="541">
    <input type="hidden" name="_wpcf7_version" value="5.7.7">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f541-o6">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="input-holder">
    <p><label for="start-now-name">Full Name<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="start-now-name" aria-required="true" aria-invalid="false" value="" type="text"
          name="your-name"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="start-now-email">Email<mark>*</mark></label><br>
      <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email form-control" id="start-now-email" aria-required="true"
          aria-invalid="false" value="" type="email" name="your-email"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><label for="start-now-business">Organization Name</label><br>
      <span class="wpcf7-form-control-wrap" data-name="business"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" id="business" aria-required="true" aria-invalid="false" value="" type="text"
          name="business"></span>
    </p>
  </div>
  <div class="input-holder">
    <p><span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea form-control" aria-invalid="false" placeholder="Message" name="your-message"></textarea></span>
    </p>
  </div>
  <div class="text-center">
    <p><input class="wpcf7-form-control has-spinner wpcf7-submit btn button" type="submit" value="Submit"><span class="wpcf7-spinner"></span>
    </p>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

Text Content

Log in Request a Demo
 * 
 * Solution Use-Cases
 * Platform
   Platform
    * Overview Advanced, Yet Simple Security
    * Getting Started Set up in only 10 minutes.
    * Benefits Simple, Secure, Sustainable
    * Features Acreto SASE+Plus Capabilities
   
   SASE vs. SASE +Plus
   
   Ecosystem security delivers robust and consistent security across all
   technologies, whether external or internal, at the network edge or within.
   
   Solution Brief
 * Blog
 * About
   About
    * Our Story Security for Everyone
    * Leadership Meet Our Leaders
    * Acreto Security Insight Blogs
   
    
   
   New CISA Directive On Persistent Threats
   
   
   
   Read More
 * Contact Us


NEW LINUX VULNERABILITIES ACTIVELY EXPLOITED

May 24th, 2023 | Author: Acreto Threat Labs

Cybersecurity researchers have uncovered new vulnerabilities in widely used
Linux components, posing a significant risk to critical infrastructure and
sensitive data. These vulnerabilities have been identified as frequent targets
for malicious cyber actors and have been active since as far back as 2010.

One of the vulnerabilities affects Red Hat Polkit, an essential toolkit
responsible for managing the policy between privileged and unprivileged
processes. This vulnerability enables attackers to bypass credential checks,
leading to privilege escalation. With this exploit, unauthorized individuals can
gain higher privileges, potentially compromising system security and accessing
sensitive information.

Another vulnerability has been discovered within the Linux Kernel itself. This
vulnerability introduces a race condition, making the behavior of the program
susceptible to manipulation by attackers. By altering the timing or order of
operations, malicious actors can launch denial-of-service attacks, corrupt data,
or even escalate their privileges within the system.

The Reliable Datagram Sockets (RDS) protocol implementation in the Linux Kernel
is also affected by a vulnerability. Exploiting improper input validation, local
users can exploit this flaw to gain elevated privileges. This means that
unauthorized users within the system can potentially acquire higher privileges
than intended, compromising the security and confidentiality of sensitive data.


ACRETO SOLUTION

Acreto can effectively address these Linux-related vulnerabilities.

 * CVE-2021-3560: Acreto’s Ecosystems can address this vulnerability by
   providing micro-segmentation and nano-segmentation capabilities. Ecosystems
   can easily isolate individuals or groups of systems, limiting access only to
   systems that need to interoperate together. By segmenting the Linux systems
   and implementing access controls based on the principle of least privilege,
   Acreto can help prevent unauthorized bypassing of credential checks and
   mitigate privilege escalation.

 * CVE-2014-0196: To address this vulnerability in the Linux Kernel, Acreto’s
   Ecosystems provide isolated data flows between systems. By defining isolated
   data flows between vulnerable systems and other authorized Ecosystem members,
   Acreto can limit access to specific sources, destinations, network protocols,
   ports, and application protocols. This can help prevent local users from
   exploiting the race condition vulnerability and gaining elevated privileges.

 * CVE-2010-3904: For the vulnerability in the Linux Kernel’s RDS protocol
   implementation, by segmenting the Linux systems and defining isolated data
   flows, Acreto can limit access to the RDS protocol and prevent local users
   from exploiting the improper input validation vulnerability, thus mitigating
   the risk of elevated privileges.

ECOSYSTEM SECURITY ISOLATION

Ecosystems deliver a dedicated security infrastructure that can be deployed per
application, use-case, project or third-party. An Ecosystem inherently limits
access only to users, devices, systems and applications that need to
interoperate together.

Ecosystems support any technology, on any network, anywhere in the world. These
include computers, mobile devices, IoTs, Offices, Clouds, SaaS and Data Centers.

Ecosystems can be configured as:

Open → With inbound or outbound access from or to the Internet or a third-party

Closed → Fully contained with access limited to Ecosystem members

Hybrid → Where some systems have inbound or outbound Internet access while
others operate fully contained.

Eliminate the Internet Attack Surface

Eliminates any and all access from the Internet while Ecosystem members can
interoperate with authorized systems and applications.

Eliminate the Internal Attack Surface

Ecosystems can easily isolate individual or groups of systems on a shared
network or entire networks, to limit access only to systems that need to
interoperate together. This is done with

 * Micro-Segmentation Segmenting groups of systems on any shared network,
   including hostile networks or the entire network.

 * Nano-Segmentation Isolating an individual system, device or application to
   limit access only to other authorized Ecosystem members.

Isolated Data Flows

Isolated data flows can be defined between two Ecosystem members to limit access
to specified sources and destinations, network protocols and ports, application
protocols as well as application programs.

ENCRYPTED SECURE SCAN

Secure Scan addresses a key weakness in many security tools today. 90%+ of all
communications is encrypted, yet only 10% of organizations have the means to
secure these communications. Encrypted Secure Scan decrypts, scans, and
re-encrypts communications inline and in real-time.

Any malicious content embedded in the encrypted payload is blocked, while the
clean and validated communication is delivered to its final destination.


CONTROLS

ACCESS CONTROL

Identity with MFA

 * User Authorizes access to the Ecosystem by a user’s identity, including MFA,
   as authenticated by the organizations’ Directory Services such as Active
   Directory or LDAP, as well as third-party Identity Service Providers such as
   Okta, Ping, Duo, and CloudJump among others.

 * Device Specifies a unique identity to each device to validate that a
   specified device that does not rely on a user to operate – such as an
   autonomous application or IoT, is allowed to join the Ecosystem.

Network Protocol / Port

Control the network protocol (TCP, UDP, ICMP) and Port (1-65535) any Ecosystem
member can use to communicate with any other Ecosystem member or Internet
resource by IP, user or device identity. Both inbound and outbound Internet
flows are supported.

Application Protocol

Control the application protocol (HTTP, DNS, SMTP, SMB, etc…) any Ecosystem
member can use to communicate with any other Ecosystem members or Internet
resource by IP, user or device identity. Both inbound and outbound Internet
flows are supported.

Application Program

Control the application program (MS-Exchange, Oracle, Facebook, GMail, etc…) any
Ecosystem member can use to communicate with any other Ecosystem members or
Internet resource by IP, user or device identity. Both inbound and outbound
Internet flows are supported.

CONTENT

Content Category

Control communication based on content categories such as Adult, Gambling,
Politics, Malware sites among 90+ category options.

File Type Upload / Download Controls

Control upload/download of files by type such .EXE, PDF, XLS, DOC, SCR, and MSI
among hundreds of options.

Data Leak Prevention

Prevent data leaks by identifying and mitigating the upload or download of
sensitive data such as:

 * Credit Cards Upload / Download Controls

 * Social Security Number Upload / Download Controls

 * RegEx Pattern Upload / Download Controls



THREAT PREVENTION

After verification of network protocol, port, application protocol and
application program, a deep inspection is performed on all communications. The
effectiveness of this method is amplified by inline Encrypted Secure Scan.
Threat prevention capabilities utilize two key methods:

Threat Signature

Identifies and mitigates known bad exploits, malware, botnets and ransomware.

Zero-Day Behavioral Analysis

Looks for behavioral indication of threats based on how system functions react
to the payload, immediately and over time.

SIMPLICITY

Acreto Ecosystems are very easy to provision and deploy. There are no hardware
dependencies or associated logistics.

Provisioning an Ecosystem takes 3-5 minutes. Simply provide a unique name to the
Ecosystem then choose the bandwidth desired and within a few minutes your
Ecosystem providing a dedicated security infrastructure is ready.

Depending on your connection options for Ecosystem members, deployment can take
between 10 minutes to a few hours.

SUSTAINABILITY

Acreto Ecosystems utilize a sustainable model without any dependency on products
and their associated logistics. There are no more updates, upgrades or
technology refreshes.

Change Management

Different Ecosystems operate completely independently from one another.
Therefore, change management impacts only members of a specified Ecosystem, not
the entire organization. This simplifies the traditionally complex change
management process.

Policy Management

Policy management also benefits from Ecosystems. Because Ecosystems are specific
to a customer scenario such as an application, use-case, project or third-party,
all policies apply to the scenario. Moreover, when its time for policy cleanup,
when an application or use-case is retired, disabling or deleting the Ecosystem
automatically prunes the policies. This has traditionally been a complex task
that is at best inaccurate.


MECHANISM OF ATTACK

 * CVE-2021-3560 – Red Hat Polkit: Red Hat Polkit, an application-level toolkit
   for managing the policy between privileged and unprivileged processes, has an
   incorrect authorization vulnerability. Attackers can bypass credential checks
   for D-Bus requests, leading to privilege escalation.

 * CVE-2014-0196 – Linux Kernel: The Linux Kernel is susceptible to a race
   condition vulnerability within the n_tty_write function. Local users can
   exploit this flaw to cause denial-of-service or gain elevated privileges
   through read and write operations involving long strings.

 * CVE-2010-3904 – Linux Kernel: The Linux Kernel’s Reliable Datagram Sockets
   (RDS) protocol implementation contains an improper input validation
   vulnerability. Local users can exploit this flaw by crafting the sendmsg and
   recvmsg system calls, gaining elevated privileges.

For more details on CVEs, visit: CVE – CVE (mitre.org)



About Acreto

Acreto delivers full-stack cybersecurity without products, logistics or
significant security expertise. It creates and consolidates the best of
cybersecurity into a single plug-and-play platform with automated updates to
stay ahead of threats. Acreto activates enterprise-grade security instantly, so
organizations can run safely, easily, and without interruption.


RELATED POSTS


NEW CISA DIRECTIVE ON PERSISTENT...


Category: Threat Intel
Author: Acreto Threat Labs May 24th, 2023



2.2 MILLION UNIVERSITY CREDENTIALS FOUND...


Category: Threat Intel
Author: Acreto Threat Labs May 24th, 2023



ABOUT THE AUTHOR: ACRETO THREAT LABS




CATEGORIES

 * News(11)
 * Security Blog(14)
 * Threat Intel(49)
 * Use-Cases(3)


RECENT POSTS

 * Threat Intel
 * New CISA Directive On Persistent Threats

 * Threat Intel
 * 2.2 Million University Credentials Found on the Dark Web

 * Threat Intel
 * China-Centric RedClouds Campaign Targeting RDP

 * Threat Intel
 * North Korea Targets Higher-Ed with Wiretap Malware


LEARN MORE OR GET STARTED

Full Name*


Business e-mail*


Organization Name*








STAY CONNECTED

Join the Acreto community and get exclusive updates





 * 
 * 

RESOURCES

 * Solution Use-Cases
 * Architecture Use-Cases
 * SASE vs. SASE +Plus
 * SASE +Plus Overview
 * Getting Started with SASE +Plus
 * SASE +Plus Benefits
 * SASE +Plus Features

COMPANY

 * About
 * Leadership
 * Contact Us

 * sales@acreto.io
 * careers@acreto.io
 * contact@acreto.io

 * Privacy Policy

©2023 Acreto. All rights reserved

Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic
information.

Full Name*


Email*


Organization Name








Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic
information.

Full Name*


Email*


Organization Name








Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic
information.

Full Name*


Email*


Organization Name








Interested in seeing Acreto SASE+Plus in action? Let’s start with some basic
information.

Full Name*


Email*


Organization Name







Have Questions?

How can we help?