Alert issued over critical vulnerabilities in Linux’s AppArmor security layer – more than 12 million enterprise systems are at risk of root access
Researchers have warned Linux flaws allow unprivileged local users to gain root privileges and weaken container isolation
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Qualys researchers have uncovered a set of nine vulnerabilities in Linux's built-in security layer, AppArmor, that affect more than 12 million enterprise systems around the world.
Researchers at the company's Threat Research Unit said the flaws allow unprivileged local users to circumvent kernel protections, escalate to root privileges, and weaken container isolation.
Notably, these flaws have existed since 2017 and affect more than 12.6 million enterprise Linux instances worldwide - any organization running Ubuntu, Debian, or SUSE will be affected, according to Qualys.
Industries most affected are likely to include cloud computing, banking and finance, manufacturing, healthcare, telecommunications, and government.
AppArmor is a Linux security module that provides mandatory access control (MAC) by applying profiles to applications. It's been part of the mainline Linux kernel since version 2.6.36.
"As the default mandatory access control mechanism for Ubuntu, Debian, SUSE, and numerous cloud platforms, its ubiquity across enterprise environments, Kubernetes, IoT, and edge environments amplifies the threat surface significantly," warned Qualys senior manager, Threat Research Unit, Saeed Abbasi in an advisory.
What Linux users need to know about "CrackArmor"
Dubbed “CrackArmor”, the vulnerabilities are confused-deputy flaws that allow unprivileged users to manipulate security profiles via pseudo-files, bypass user-namespace restrictions, and execute arbitrary code within the kernel.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The flaws facilitate local privilege escalation to root through complex interactions with tools like Sudo and Postfix, alongside denial-of-service attacks via stack exhaustion, and Kernel Address Space Layout Randomization (KASLR) bypasses via out-of-bounds reads.
"Consequently, these findings expose critical gaps in our reliance on default security assumptions," said Abbasi. "It fundamentally undermines system confidentiality, integrity, and availability globally, extending the vulnerability exploitation window for legacy deployments."
Qualys said it has developed Proof of Concepts (PoCs) demonstrating the full exploitation chain for the CrackArmor vulnerabilities. These, along with working exploits, have been shared with the security team to work on immediate remediation.
While the firm is withholding the public release of the exploit code for the time being, the technical nature of the flaws allows for independent validation by the security community, it said.
There are no CVEs as yet, which can take a couple of weeks longer for upstream kernel issues. However, Abbasi warned enterprises shouldn’t underestimate the potential risks.
"Don’t let the absence of a CVE number downplay the significance. If you’re running affected versions, treat this advisory seriously and update accordingly."
What can enterprises do?
The CrackArmor vulnerabilities align directly with the operational playbook of state-sponsored threat actors whose campaigns consistently prioritize destruction over espionage.
These groups have ramped up attacks on the energy, water, healthcare, and defense sectors in recent years.
"CrackArmor drastically lowers the barrier for catastrophic disruption," said Abbasi.
"An attacker no longer needs administrative credentials or lateral movement to cause severe damage; any routine initial access vector that yields an unprivileged local account is now sufficient to instantly weaponize the host, triggering a kernel panic or denying all traffic."
As such, organizations should treat this as a priority patching event. Qualys also outlined a series of steps for security teams to take. These include:
- Apply vendor kernel updates immediately
- Scan for exposure using detection QIDs
- Implement monitoring on /sys/kernel/security/apparmor/ for unauthorized profile modifications
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
AutoCAD Users may have a ransomware problem – here's what they can doIn-depth A new malware family is currently using the same file types as the professional design software AutoCAD
-
Google Workspace just got a huge Gemini updateNews Google is targeting deeper Gemini integration across a range of Workspace applications
-
AI-generated code is fast becoming the biggest enterprise security risk as teams struggle with the ‘illusion of correctness’News Security teams are scrambling to catch AI-generated flaws that appear correct before disaster strikes
-
The open source ecosystem is booming thanks to AI, but hackers are taking advantageNews Analysis by Sonatype found that AI is giving attackers new opportunities to target victims
-
UK government launches industry 'ambassadors' scheme to champion software security improvementsNews The Software Security Ambassadors scheme aims to boost software supply chains by helping organizations implement the Software Security Code of Practice.
-
AI-generated code is now the cause of one-in-five breaches – but developers and security leaders alike are convinced the technology will come good eventuallyNews AI coding tools now write 24% of production code globally, but it's risky and causing issues for developers and security practitioners alike.
-
US Senator calls for Microsoft FTC probe over ‘gross cybersecurity negligence’ – Ron Wyden claims the tech giant has provided ‘dangerous, insecure software’ to the US governmentNews Ron Wyden, a Democratic senator from Oregon, has written to the chair of the FTC calling for an investigation into Microsoft's cyber practices.
-
The NCSC just urged enterprises to ditch Windows 10 – here’s what you need to knowNews The UK cyber agency says those that haven’t migrated to Windows 11 should do so immediately
-
Enterprises need to sharpen up on software supply chain securityNews A new report from LevelBlue shows many enterprises are failing on software supply chain security, despite growing risks.
-
AI-generated code is in vogue: Developers are now packing codebases with automated code – but they’re overlooking security and leaving enterprises open to huge risksNews While AI-generated code is helping to streamline operations for developer teams, many are overlooking crucial security considerations.
