VerSprite cybersecurity has tested and confirmed several new vulnerabilities discovered by GRIMM that affect the Linux iSCSI subsystem. Two of these vulnerabilities (CVE-2021-27365 and CVE-2021-27363) can be used together for a Local Privilege Escalation, which allows a normal user to gain root privileges, while the third (CVE-2021-27364) can be used for a Denial of Service (DoS) attack. VerSprite has confirmed that unpatched Workstation and Server with GUI installations of Red Hat Enterprise Linux and CentOS Linux versions 8.1, 8.2, and 8.3 are vulnerable. These versions are vulnerable due to their auto-loading of the libiscsi kernel module. Other Linux distributions and versions are likely vulnerable if they meet the conditions of the exploit.
An authenticated attacker with normal user privileges can escalate to root privileges or perform a local DoS attack on the system.
CentOS 8 / Red Hat Enterprise Linux 8 with the following installations:
More Linux distributions are possibly vulnerable, but VerSprite has not been able to confirm yet. The aforementioned installations are vulnerable due to those configurations loading the iSCSI kernel modules by default.
CentOS and Red Hat Enterprise Linux are distributions of the Linux operating system.
CentOS 8 / Red Hat Enterprise Linux 8 with the following installations:
GRIMM researchers have provided a Proof of Concept (PoC) to demonstrate the exploitability of the vulnerabilities found. During research and testing, VerSprite developed a detection script to be used in conjunction with the PoC exploit to simplify the process. It is highly advised to use these in a test environment and not on production systems.
VerSprite’s detection script can be downloaded from https://github.com/VerSprite/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The provided python script requires root privileges to run, with a non-root username passed as a command argument to use for privilege escalation.
Example: To run the following command from a user with sudo privileges, replace
$ sudo python3 detect_iscsi_vuln.py
Once the PoC package is downloaded and extracted, start a command line session and move to the exploit’s build directory.
$ sudo yum install -y make gcc
$ make
$ cp a.sh /tmp/
$ chmod + x /tmp/a.sh
NOTE: This step may require a few attempts to run successfully.
$ ./exploit
$ ls -l /tmp/proof
VerSprite advises writing Yara rules in your SIEM to detect the following items on any Linux host in your environment.
VerSprite’s Threat Intelligence Group provides organizations with real-time threat monitoring, analysis, prevention recommendations, and mitigation. Our elite team works with companies across all industries and security maturity levels to defend against threats. For more information on VerSprite’s Threat Intel Group or their managed monitoring tool, CTIP, contact one of our security advisers today. Contact VerSprite →
VerSprite leverages our PASTA (Process for Attack Simulation and Threat Analysis) methodology to apply a risk-based approach to threat modeling. This methodology integrates business impact, inherent application risk, trust boundaries among application components, correlated threats, and attack patterns that exploit identified weaknesses from the threat modeling exercises.