<  Back to rules search

Pwnkit privilege escalation attempt

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect exploitation of CVE-2021-4034 dubbed PwnKit.

Strategy

PwnKit is a local privilege escalation vulnerability originally found by Qualys. It affects PolicyKit’s pkexec program, which is a SUID-root program installed by default on many Linux distributions. This detection triggers whenever pkexec is executed by a non-root process with the SHELL and PATH variables set.

Triage and response

  1. Determine the purpose of the process executing pkexec.
  2. Look for any suspicious actions or commands being executed after the pkexec execution.
  3. If this behavior is unexpected, it could indicate a malicious actor has access to the host and is attempting to increase privileges for post exploitation actions. Investigate application logs or APM data to look for indications of the initial compromise. Follow your organization’s internal processes for investigating and remediating compromised systems.
  4. Ensure to update the PolicyKit package to its latest version to mitigate the vulnerability. If updating is not feasible, remove the SUID bit that is set by default on pkexec with the following command: sudo chmod -s \$(which pkexec).

Requires Agent version 7.27 or greater