Linux Polkit Privilege Escalation Vulnerability (CVE-2021-4034)
Description
A security research team disclosed a privilege escalation vulnerability (CVE-2021-4034, also dubbed PwnKit) in PolKit's pkexec. Unprivileged users can gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration. Currently, the POC/EXP of this vulnerability has been disclosed, and the risk is high.
Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. pkexec is a part of the Polkit framework. It executes commands with elevated permissions and is an alternative to Sudo. If you are a Polkit user, check your Polkit version and implement timely security hardening.
Reference: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
Type |
CVE-ID |
Severity |
Discovered |
---|---|---|---|
Privilege escalation |
CVE-2021-4034 |
High |
2022-01-28 |
Impact
Affected versions: all mainstream Linux versions
Secure versions: View the security bulletins of Linux vendors.
Solution
- Linux vendors, such as Red Hat, Ubuntu, Debian, and SUSE, have released patches to fix this vulnerability. Upgrade your Linux OS to a secure version. If you are unable to update it in a timely manner, you can mitigate the risk by referring to the official suggestions provided by these vendors.
RedHat, Ubuntu: USN-5252-1, USN-5252-2; Debian, SUSE
- EulerOS has released a patch. You only need to upgrade the polkit package (.rpm).
- If no patch is available in your system, run the # chmod 0755 /usr/bin/pkexec command to delete SUID-bit from pkexec.
Before fixing vulnerabilities, back up your files and conduct a thorough test.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.