Critical Linux Flaws Discovered Allowing Root Access Exploits


Two new vulnerabilities have been discovered in widely deployed Linux components that could allow unprivileged users to gain root access across popular distributions.

The first is a local privilege escalation (LPE) flaw tracked as CVE-2025-6018, which affects the PAM configuration in openSUSE Leap 15 and SUSE Linux Enterprise 15. 

This misconfiguration allows any local login session, including those over SSH, to be treated as if the user were physically present. That status, known as “allow_active,” grants access to certain privileged operations typically reserved for users on the machine.

The second vulnerability, CVE-2025-6019, resides in libblockdev and can be triggered via the udisks daemon, which is installed by default on nearly all Linux distributions. Once a user obtains allow_active status, this flaw enables full root access.

Combined, these two flaws create a direct and low-effort path from unprivileged to root access.

Exploit Chain Impacts Multiple Distributions

The udisks daemon and its libblockdev backend are used for managing disks and storage devices. By design, they grant more privileges to users marked as “active.” The PAM flaw subverts this trust model, turning routine sessions into security liabilities.

The exploit chain is especially dangerous because no extra software or physical access is required, just a working SSH login to a vulnerable system.

The Qualys Threat Research Unit (TRU) has successfully demonstrated this exploit chain on Ubuntu, Debian, Fedora and openSUSE Leap 15. Its significance lies in how easily attackers can leap from a standard SSH session to full root privileges using only default-installed components.

“Nothing exotic is required,” TRU researchers said.

“Each link is pre-installed on mainstream Linux distros and their server builds.”

Key risks include:

  • Complete takeover of affected systems

  • Evasion of endpoint detection tools

  • Installation of persistent backdoors

  • Fleet-wide compromise via lateral movement

Read more on Linux vulnerabilities: New Linux Vulnerabilities Surge 967% in a Year

Mitigation and Recommendations

Security teams are urged to patch both vulnerabilities immediately.

In addition, they are advised to:

  • Modify the default polkit rule for org.freedesktop.udisks2.modify-device

  • Change the allow_active setting from yes to auth_admin

  • Follow vendor advisories for SUSE, Ubuntu and others

Failing to act quickly may leave entire fleets exposed to compromise. The root access granted through this exploit enables undetectable persistence and cross-system attacks, amplifying the risk to enterprise infrastructure.



Source link

Leave a Comment