Privilege Escalation Vulnerability in Linux Kernel by The Linux Foundation
CVE-2016-5195

7HIGH

Key Information:

Vendor

Canonical

Vendor
CVE Published:
10 November 2016

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 11,800πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 94%πŸ¦… CISA Reported

What is CVE-2016-5195?

CVE-2016-5195, also known as "Dirty COW," is a privilege escalation vulnerability in the Linux kernel that affects versions 2.x through 4.x prior to 4.8.3. This vulnerability arises from a race condition in the kernel's handling of the copy-on-write (COW) mechanism, enabling local users to write to read-only memory mappings. By exploiting Dirty COW, attackers with local access can elevate their privileges to root, granting them vast control over the system. This poses a significant risk to organizations, as it may allow attackers to execute arbitrary code, access sensitive information, and compromise the integrity and security of affected systems.

Potential impact of CVE-2016-5195

  1. Privilege Escalation: The primary impact of this vulnerability is the potential for local users to gain elevated privileges. This could allow unauthorized users to perform administrative tasks, install malicious software, or take control of the system, thus exacerbating security risks in an organization.

  2. System Compromise: Successful exploitation can lead to full system compromise, wherein attackers can gain access to sensitive data and critical infrastructure. This may involve stealing confidential information or impacting essential services, thereby causing significant operational disruptions.

  3. Propagation of Malware: Given the ability to change system permissions and install software, this vulnerability could enable the deployment of ransomware or other malicious payloads. Such actions could lead to data breaches, financial losses, and extensive remediation efforts for affected organizations, further highlighting the need for immediate remediation.

CISA has reported CVE-2016-5195

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2016-5195 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply updates per vendor instructions.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

94% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ¦…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.