Microsoft has identified multiple vulnerabilities, referred to as Nimbuspwn, that may let a hacker attain root access on many Linux desktop endpoints. The flaws can be chained together to give hackers unrestricted root access and the ability to deploy malicious payloads like a backdoor or malware. The vulnerabilities are tracked as CVE-2022-29799 and CVE-2022-29800 are directory traversal, symlink race, and time-of-check-time-of-use race condition vulnerabilities that could allow attackers to perform privileges escalation, deploy malicious payloads and carry out other malicious activities on the vulnerable Linux machines. We urge all communities who work or own Linux systems shouldn’t underscore the importance of Nimbuspwn Vulnerability and learn how to fix Nimbuspwn Vulnerability in Linux, A Privilege Escalation Vulnerability in the networkd-dispatcher unit.
Nimbuspwn Vulnerability is the chain of two vulnerabilities identified in a systemd component called networkd-dispatcher, a service that is designed to dispatch network status changes. Attackers could chain directory traversal, symlink race, and time-of-check-time-of-use race condition vulnerabilities to perform privileges escalation, arbitrary code execution, deploy malicious payloads, and carry out other malicious activities on the vulnerable Linux machines. Check out this link below to see the full technical details published by Microsoft.
According to the Debian Linux distribution, networked-dispatcher v2.0-2 and 2.1-2 are vulnerable to the flaw. If you have a networked-dispatcher with the below versions on your Debian-based Linux distributions, please fix the flaw.
Release | Version |
---|---|
buster | 2.0-2 |
bullseye | 2.1-2 |
bookworm | 2.1-2 |
sid | 2.1-2 |
It is simple to check this. All you need to check the version information of networked-dispatcher running on your server. There are two simple commands to check the version of networked-dispatcher.
$ sudo apt list networkd-dispatcher
This command is enough to see the version info.
$ sudo apt show networkd-dispatcher
Where as this command will give your comprehensive information about the package. You can check the output here.
In this case, this server is vulnerable to the flaw since v2.1-2 is running on this machine.
The best and simple measure to fix the Nimbuspwn Vulnerability is to go for upgradation after Linux distributions have released the fixed version of networkd-dispatcher. Unfortunately, Debian and Ubuntu distributions have not released the fixed version yet. We recommend to track the updates on their websites.
You can install, upgrade, remove, and purge networkd-dispatche as like any other apt repository package.
Command to update system repositories
$ sudo apt update
Command to install networkd-dispatcher
$ sudo apt install networkd-dispatcher
Command to upgrade networkd-dispatcher
$ sudo apt upgrade networkd-dispatcher
Command to remove or purge networkd-dispatcher with dependencies.
$ sudo remove networkd-dispatcher
$ sudo purge networkd-dispatcher
$ sudo remove –auto-remove networkd-dispatcher
$ sudo purge –auto-remove networkd-dispatcher
If the packages are not added to the apt repository, then download the package or source of the package and install like a regular Linux package.
We hope this post would help you know How to Fix Nimbuspwn Vulnerability in Linux- A Privilege Escalation Vulnerability in networkd-dispatcher. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
How To Fix The Dirty Pipe Vulnerability In Linux Kernel- CVE-2022-0847
How To Fix CVE-2022-0492- Privilege Escalation And Container Escape Vulnerabilities In Cgroups
How To Fix CVE-2022-25636- A Heap Out Of Bounds Write Vulnerability In Netfilter
What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?
How To Fix CVE-2021-44731 (Oh Snap!)- A Privilege Escalation Vulnerability In Snap Package Manager
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.