Tag

Privilege Escalation

All articles tagged with #privilege escalation

technology23 days ago

Ubuntu Snap Local Privilege Escalation CVE-2026-3888 Prompts Patch Rollout

A high-severity local privilege escalation in Ubuntu's snapd (CVE-2026-3888) could let a local user recreate the snap private /tmp directory when systemd-tmpfiles runs, enabling root access. Qualys-discovered flaw has prompted patches across Ubuntu releases, with 24.04 LTS and 25.10 affected out-of-the-box; Ubuntu 22.04 LTS and older are only impacted in non-default configurations.

security28 days ago

Ubuntu AppArmor Flaws Could Enable Local Privilege Escalation

Qualys disclosed multiple vulnerabilities in Ubuntu’s AppArmor kernel security module (CrackArmor) that can cause memory leaks and DoS, and, when combined with a sudo discovery, may enable local privilege escalation. Canonical is rolling out fixes across affected Ubuntu releases, addressing issues from DFA state bounds and memory leaks to policy namespace limits and race conditions. The advisory also notes unsafe su behavior prompting hardening, with the sudo flaw affecting releases back to 22.04 LTS and su hardening traced to 20.04 LTS; more details are available in Qualys’ advisory.

Critical SQL Server zero-day lets attackers escalate to full admin control
cybersecurity1 month ago

Critical SQL Server zero-day lets attackers escalate to full admin control

Microsoft disclosed a critical zero-day in SQL Server (CVE-2026-21262) that enables an authenticated attacker to escalate to the sysadmin role via improper access control. The flaw has a CVSS v3.1 base score of 8.8 (Important) and is exploitable over the network with low complexity and no user interaction. While not yet observed in the wild, the disclosure lowers the barrier for exploits. Microsoft has released patches for SQL Server 2016–2025; administrators should urgently apply updates, audit permissions, restrict privileged access, and upgrade unsupported versions to receive future fixes.

Microsoft Patch Tuesday: 84 Fixes, Two Public Zero-Days, and Faster Hotpatching
security1 month ago

Microsoft Patch Tuesday: 84 Fixes, Two Public Zero-Days, and Faster Hotpatching

Microsoft released 84 patches in March Patch Tuesday across its software stack, including two publicly disclosed zero-days: CVE-2026-21262 in SQL Server and CVE-2026-26127 in .NET. Eight flaws are critical and 76 are important, with privilege escalation accounting for 46 fixes. Notable issues include a Winlogon privilege escalation (CVE-2026-25187, 7.8), an Azure MCP server-side request-forgery (CVE-2026-26118, 8.8) that could abuse the server’s identity, and a high-severity RCE in the Microsoft Devices Pricing Program (CVE-2026-21536, 9.8) that Microsoft says is fully mitigated. An Excel information-disclosure flaw (CVE-2026-26144, 7.5) could enable data exfiltration via Copilot Agent in a zero-click attack. Microsoft is also moving toward hotpatch security updates via Windows Autopatch by May 2026 to speed fixes, with XBOW credited for vulnerability discovery and researchers noting such bugs often enable post-compromise activity.

Chrome Gemini Panel Flaw Could Let Extensions Escalate Privileges (CVE-2026-0628)
technology1 month ago

Chrome Gemini Panel Flaw Could Let Extensions Escalate Privileges (CVE-2026-0628)

Security researchers disclosed a now-patched Chrome vulnerability, CVE-2026-0628, caused by weak WebView policy that could let a malicious extension inject code into the Gemini Live panel, enabling privilege escalation and access to local files, camera, microphone, and screenshots. The flaw affected Chrome versions prior to 143.0.7499.192/193 (Windows/macOS) and 143.0.7499.192 (Linux) and was fixed by Google in early January 2026. The incident underscores risks from AI-enabled browser components expanding the attack surface and the potential for abuse via extensions with basic permissions.

Microsoft Fixes Privilege Escalation Flaw in Windows Admin Center (CVE-2026-26119)
security1 month ago

Microsoft Fixes Privilege Escalation Flaw in Windows Admin Center (CVE-2026-26119)

Microsoft patched CVE-2026-26119, a high-severity improper authentication flaw in Windows Admin Center that could allow an authenticated attacker to elevate privileges to the user running the affected app; the fix arrived with Windows Admin Center v2511 (Dec 2025). While there are no confirmed exploits in the wild, Microsoft flags exploitation as more likely and researchers warn it could enable domain compromise under certain conditions.

CISA Warns of Active Exploitation of Critical Windows SMB and RAS Flaws
technology5 months ago

CISA Warns of Active Exploitation of Critical Windows SMB and RAS Flaws

CISA warns that a high-severity Windows SMB vulnerability (CVE-2025-33073), which allows privilege escalation and is actively exploited, affects all recent Windows versions. Microsoft patched it in June 2025, but threat actors are now exploiting it, prompting federal agencies and organizations to urgently apply updates to prevent system compromise.

Microsoft Patches Critical Entra ID Flaw Enabling Tenant Impersonation
technology6 months ago

Microsoft Patches Critical Entra ID Flaw Enabling Tenant Impersonation

Microsoft patched a critical security flaw in Entra ID (formerly Azure AD) that could have allowed attackers to impersonate any user, including Global Admins, across tenants by exploiting a token validation failure. The vulnerability, which was addressed in July 2025, involved legacy API issues and could bypass MFA and logging, posing a significant threat to tenant security. No evidence of exploitation has been reported, but the flaw highlights risks associated with legacy API dependencies and cloud misconfigurations.

Critical Microsoft Entra ID Flaw Poses Global Security Risk
technology6 months ago

Critical Microsoft Entra ID Flaw Poses Global Security Risk

A critical security flaw in Microsoft Entra ID, involving undocumented 'actor tokens' and a vulnerability in the Azure AD Graph API, could have allowed attackers to hijack any company's tenant and gain full administrative access without detection. The issue was discovered by security researcher Dirk-jan Mollema and has since been patched by Microsoft.

Microsoft Discloses Critical Exchange Server Vulnerability in Hybrid Setups
security8 months ago

Microsoft Discloses Critical Exchange Server Vulnerability in Hybrid Setups

Microsoft disclosed a high-severity vulnerability in on-premise Exchange Server (CVE-2025-53786) that could allow attackers with admin access to escalate privileges in connected cloud environments, especially in hybrid setups. The flaw, which shares a service principal with Exchange Online, poses risks of undetectable privilege escalation and identity compromise if unpatched. Microsoft recommends applying the latest hotfix, reviewing security configurations, and resetting service principal keys if no longer used. CISA also warns about related malware exploiting recent SharePoint flaws and advises disconnecting outdated or end-of-life Exchange and SharePoint servers from the internet.

CISA Alerts to Active Exploitation of Critical Linux Kernel Privilege Flaws
technology9 months ago

CISA Alerts to Active Exploitation of Critical Linux Kernel Privilege Flaws

Two critical local privilege escalation vulnerabilities in Linux's udisks and PAM framework can allow attackers to gain root access on major Linux distributions. The flaws, CVE-2025-6018 and CVE-2025-6019, are especially dangerous because udisks is widely used by default, and exploits have been demonstrated on popular distros like Ubuntu, Debian, Fedora, and openSUSE. Immediate patching is strongly recommended to prevent potential system compromises.

CISA Alerts to Widespread Linux Kernel Privilege Escalation Vulnerabilities
security9 months ago

CISA Alerts to Widespread Linux Kernel Privilege Escalation Vulnerabilities

The U.S. CISA has issued a warning about an actively exploited privilege escalation vulnerability in the Linux kernel (CVE-2023-0386), which allows local users to gain root access by exploiting an improper ownership management bug in OverlayFS. Although patched earlier in 2023, the flaw is being exploited in the wild, and federal agencies are required to apply patches by July 8, 2025.