CVE-2024-1086: Critical Privilege Escalation Flaw in Linux Kernel
Detection stack
- AIDR
- Alert
- ETL
- Query
Analysis
CVE-2024-1086 is a critical local privilege escalation vulnerability in the Linux kernel’s netfilter (nf_tables) component that allows a local attacker to gain root privileges on affected systems. It is a use-after-free/double-free bug that was introduced around 2014, carries a high severity score, and has been observed in real-world exploitation.
Investigation
The flaw originates in the nft_verdict_init() logic within nf_tables: a crafted drop-error verdict combined with hooks via nf_hook_slow() can trigger a double-free of packet structures, leading to kernel memory corruption and privilege escalation. Proof-of-concept exploit code was published showing successful exploitation across many kernel versions (notably 5.14 through 6.6 and beyond), especially where unprivileged user namespaces are enabled, and the vulnerability has been leveraged in ransomware campaigns.
Mitigation
Administrators should upgrade affected Linux kernels to patched versions that close the double-free condition. Temporary mitigations include disabling unprivileged user namespaces (sysctl -w kernel.unprivileged_userns_clone=0) and making that change persistent via /etc/sysctl.d/. Additional measures include restricting local access, limiting who can create namespaces, and monitoring for anomalous root shells or other signs of kernel compromise.
Response
Treat suspected exploitation as a high-priority host compromise: isolate affected systems, perform full forensic analysis of kernel logs and persistence, rotate credentials, and hunt for lateral movement. Expedite patching of vulnerable hosts or consider retiring systems that cannot be updated. Update detection and hunting rules to cover indicators of nf_tables memory corruption and related exploitation attempts.
Attack Flow
We are still updating this part. Sign up to get notified
Notify MeDetection Rules
We are still updating this part. Sign up to get notified
Notify Me