Linux Polkit Privilege Escalation Vulnerability (CVE-2021-4034)
Description
A security research team disclosed a privilege escalation vulnerability (CVE-2021-4034, also dubbed PwnKit) in PolKit's pkexec. Unprivileged users can gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration. Currently, the POC/EXP of this vulnerability has been disclosed, and the risk is high.
Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. pkexec is a part of the Polkit framework. It executes commands with elevated permissions and is an alternative to Sudo. If you are a Polkit user, check your Polkit version and implement timely security hardening.
Reference: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
Type |
CVE-ID |
Severity |
Discovered |
---|---|---|---|
Privilege escalation |
CVE-2021-4034 |
High |
2022-01-28 |
Impact
Affected versions: all mainstream Linux versions
Secure versions: View the security bulletins of Linux vendors.
Solution
- Linux vendors, such as Red Hat, Ubuntu, Debian, and SUSE, have released patches to fix this vulnerability. Upgrade your Linux OS to a secure version. If you are unable to update it in a timely manner, you can mitigate the risk by referring to the official suggestions provided by these vendors.
RedHat, Ubuntu: USN-5252-1, USN-5252-2; Debian, SUSE
- EulerOS has released a patch. You only need to upgrade the polkit package (.rpm).
- If no patch is available in your system, run the # chmod 0755 /usr/bin/pkexec command to delete SUID-bit from pkexec.
Before fixing vulnerabilities, back up your files and conduct a thorough test.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot