securityonline.info
Open in
urlscan Pro
2600:1f10:4c55:e23d:5d5b:8bb5:8ae2:1fff
Public Scan
Submitted URL: http://securityonline.info/severe-unauthenticated-rce-flaw-cvss-9-9-in-gnu-linux-systems-awaiting-full-disclosure/
Effective URL: https://securityonline.info/severe-unauthenticated-rce-flaw-cvss-9-9-in-gnu-linux-systems-awaiting-full-disclosure/
Submission: On September 25 via api from DE — Scanned from CA
Effective URL: https://securityonline.info/severe-unauthenticated-rce-flaw-cvss-9-9-in-gnu-linux-systems-awaiting-full-disclosure/
Submission: On September 25 via api from DE — Scanned from CA
Form analysis
3 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"
dir="ltr" spellcheck="false"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" style="display: none;" title="Clear search box" role="button"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Skip to content Cybersecurity News * Search for: * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows Search for: Cybersecurity News * Linux / Vulnerability SEVERE UNAUTHENTICATED RCE FLAW (CVSS 9.9) IN GNU/LINUX SYSTEMS AWAITING FULL DISCLOSURE by do son · September 23, 2024 A critical security vulnerability affecting all GNU/Linux systems—and potentially others—has been identified by renowned security researcher Simone Margaritelli. The vulnerability, which allows for unauthenticated remote code execution (RCE), has been acknowledged by major industry players like Canonical and Red Hat, who have confirmed its severity with a CVSS score of 9.9 out of 10. Margaritelli disclosed the existence of the vulnerability approximately three weeks ago but withheld specific details to allow developers time to address the issue. Despite this, there is currently no working fix available. Discussions between the researcher and developers have led to an agreed timeline for disclosure: * September 30: Initial disclosure to the Openwall security mailing list. * October 6: Full public disclosure of the vulnerability details. Interestingly, there has been a delay in assigning Common Vulnerabilities and Exposures (CVE) identifiers to this issue. Margaritelli suggests that there should be at least three CVEs assigned, possibly up to six, due to the multifaceted nature of the vulnerabilities involved. Canonical and Red Hat have not only confirmed the vulnerability’s high severity but are also actively working on assessing its impact and developing patches. However, some developers are reportedly debating the security impact of certain aspects of the vulnerabilities, which may be contributing to the delay in releasing a fix. The lack of detailed information has left both individual users and security experts in a state of heightened concern. Without knowing which specific components, functions, or versions are affected, organizations are unable to take proactive measures to protect their systems. Moreover, the absence of CVE assignments raises questions about the coordination and communication between security researchers, vendors, and the organizations responsible for vulnerability enumeration. While a CVSS score of 9.9 indicates critical severity, it’s important to approach the situation with a balanced perspective. Not all high-severity vulnerabilities are easily exploitable in real-world scenarios. For instance: * CVE-2024-7589: An SSH remote code execution vulnerability initially scored at 9.8 was later reevaluated to 8.1 due to the difficulty of exploitation. * CVE-2024-38063: A Windows system RCE vulnerability with a CVSS score of 9.8 drew significant attention but was deemed very difficult to exploit after thorough analysis by security experts. These examples highlight the importance of detailed technical analysis to fully understand a vulnerability’s impact. While awaiting the full disclosure and subsequent patches, users and administrators should: * Stay informed by following updates from trusted security news sources and official vendor communications. * Review and enhance existing security measures, such as firewalls and intrusion detection systems. * Prepare for rapid deployment of patches once they become available. RELATED POSTS: * CVE-2024-7589: OpenSSH Pre-Authentication Vulnerability in FreeBSD Exposes Systems to RCE * CVE-2024-38063 (CVSS 9.8): 0-Click RCE Affects All Windows Systems * FreeBSD Issues Urgent Security Advisory for CVE-2024-43102 (CVSS 10) Share Tags: GNULinuxlinux vulnerability Follow: * * * * * SEARCH × search Visit Penetration Testing Tools & The Information Technology Daily Support Securityonline.info site. Thanks! * Vulnerability CVE-2024-39584: Dell BIOS Flaw Exposes Systems to Secure Boot Bypass and Arbitrary Code Execution August 29, 2024 * Vulnerability CVE-2024-7591 (CVSS 10): Critical Vulnerability Discovered in Progress LoadMaster September 5, 2024 * Vulnerability WhatsUp Gold Under Attack: New RCE Vulnerabilities Exploited September 12, 2024 * Vulnerability Researchers Detail CVE-2024-38014 0-Day Vulnerability in Windows MSI Installers Exploited in the Wild September 18, 2024 * Vulnerability Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring August 26, 2024 Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE * Sponsors Cybersecurity News © 2024. All Rights Reserved. * * * * * x 3 ✕ Here are some notifications you missed: Here are some notifications you missed: Recent Notifications Recent Notifications CVE-2024-9014 (CVSS 9.9): pgAdmin's Critical Vulnerability Puts User Data at Risk 5 hours ago Infostealers Overcome Chrome's App-Bound Encryption, Threatening User Data Security 5 hours ago Researchers Exploit Vulnerability to Obtain TLS Certificates for Any .MOBI Domain 5 hours ago Error. Try later. You have blocked Push Notifications. Follow these instructions to enable Push Notifications. Subscribe to receive push notifications on latest updates You are unsubscribed to Push Notifications You are subscribed to Push Notifications SUBSCRIBE SUBSCRIBE UNSUBSCRIBE ⚡ by Webpushr Would you like to receive notifications on latest updates? YES NOT YET X CVE-2024-9014 (CVSS 9.9): pgAdmin's Critical Vulnerability Puts User Data at Risk 5 hours ago