New Linux Privilege Escalation Vulnerabilities Give Attackers Full Root Control
Two newly discovered and interconnected Linux vulnerabilities — CVE-2025-6018 and CVE-2025-6019 — enable unprivileged attackers to escalate privileges to root across major Linux distributions. Affecting millions of systems globally, these flaws represent a severe and urgent security threat requiring immediate action.
Overview of the Vulnerability Chain
The vulnerability chain, uncovered by the Qualys Threat Research Unit, hinges on two distinct but related flaws that when exploited in sequence, allow full root access:
-
CVE-2025-6018 — A misconfiguration in the Pluggable Authentication Modules (PAM) on SUSE-based systems allows SSH users to be misclassified as local “active” users.
-
CVE-2025-6019 — A flaw in the libblockdev library, accessible via the udisks daemon, grants root privileges to users in an “allow_active” context.
Together, they form a dangerous privilege escalation chain, easily exploitable on systems with default configurations.
CVE-2025-6018: SUSE PAM Misconfiguration
This vulnerability affects openSUSE Leap 15 and SUSE Linux Enterprise 15, where the PAM stack mistakenly elevates SSH users to “allow_active” status. This designation, typically reserved for physically present users at the console, is key to gaining higher privileges via polkit policies.
Impact: Unprivileged users connecting via SSH can access functionalities meant for console users — a foundational misstep that opens the door to root escalation.
CVE-2025-6019: Udisks + libblockdev Privilege Escalation
After gaining “allow_active” status, attackers can exploit udisks2, a default system daemon on most Linux distros (Ubuntu, Debian, Fedora, openSUSE, etc.). Udisks communicates with libblockdev to manage storage devices, and attackers can use the exposed org.freedesktop.udisks2.modify-device action to run arbitrary code as root.
Impact: Allows full root access with minimal interaction, turning a foothold into total system compromise.
Affected Systems & CVSS Scores
CVE-2025-6019 affects the libblockdev package and the udisks daemon, both of which are included by default in major Linux distributions such as Ubuntu, Debian, Fedora, and openSUSE. It enables full root access when exploited by a user in an “allow_active” context — whether gained via CVE-2025-6018 or by physically accessing the system. This vulnerability carries a CVSS v3.1 score of 7.8 (High), reflecting its high impact despite requiring a preceding step or privileged context.
Urgent Mitigation Guidance
Security teams must act immediately to mitigate these flaws and prevent full system compromise.
1. Patch Affected Packages
-
Apply vendor-provided patches for:
-
PAM configurations (SUSE)
-
libblockdev and udisks2 components (all major distros)
-
2. Modify Polkit Rules
To block unauthorized privilege escalation:
-
Change the udisks2 policy for the
org.freedesktop.udisks2.modify-device
action fromallow_active
toauth_admin
.
This forces authentication for device modification, even for active users.
Why This Matters
The widespread use of default configurations and core Linux services like PAM and udisks2 makes this a near-universal threat. Exploitation can lead to:
-
Disabling of security monitoring tools
-
Installation of persistent malware
-
Lateral movement across networks
-
Total system takeover
Qualys researchers have successfully demonstrated exploits across Ubuntu, Debian, Fedora, and SUSE, proving the feasibility and danger of these flaws.
Patch Now, Not Later
The simplicity of the exploit chain and the ubiquity of affected components mean every organization running Linux is potentially vulnerable. The cost of delay could be a full-scale compromise of your infrastructure.
Patch immediately. Review polkit rules. Harden SSH configurations..
Comments
Post a Comment