The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory about a critical Linux kernel vulnerability (CVE-2023-0386) actively exploited in real-world attacks.
Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, this privilege escalation vulnerability in the OverlayFS subsystem enables local attackers to bypass security controls and gain root-level access.
The agency emphasizes immediate patching for all Linux systems using OverlayFS, particularly cloud environments and containerized workloads.
The vulnerability stems from improper uid (user identifier) management when copying files between different mount points in OverlayFS – a union filesystem implementation used for Docker containers and cloud infrastructure.
When a user transfers executable files with capabilities from a nosuid mount (which ignores setuid/setgid permissions) to a regular mount, the kernel erroneously preserves elevated capabilities.
This allows execution of privileged binaries that should be constrained by Linux’s discretionary access controls.
CISA categorizes the vulnerability under CWE-282 (Improper Ownership Management), specifically criticizing the kernel’s failure to reset capability sets during cross-mount operations.
Attackers exploit this by crafting malicious binaries that retain root privileges when moved between mount points, effectively bypassing security boundaries designed to isolate user privileges.
The vulnerability affects all Linux kernels from version 5.13 through 6.2.9, with patched versions available in subsequent releases.
While CISA confirms active exploitation in the wild, the agency has not yet observed ransomware groups weaponizing this vulnerability.
However, security researchers note its strategic value for advanced persistent threat (APT) actors targeting cloud environments. A successful exploit grants full root privileges, enabling attackers to:
The risk escalates in Kubernetes clusters and multi-tenant cloud architectures where OverlayFS facilitates container storage.
Unpatched systems allow lateral movement between containers and host systems, potentially compromising entire cloud deployments.
CISA’s advisory references Binding Operational Directive (BOD) 22-01, mandating federal agencies to implement vendor patches within strict timelines or remove affected systems from networks.
Linux maintainers have released kernel updates addressing the uid mapping vulnerability through improved capability checking during file copy operations. System administrators should:
For organizations unable to immediately patch, CISA recommends disabling OverlayFS mounts or using mount namespaces with restricted user mappings.
The agency’s KEV catalog entry serves as a prioritized remediation target, requiring federal enterprises to mitigate the vulnerability by September 14, 2025 under BOD 22-01 requirements.
CISA’s vulnerability disclosure highlights the growing sophistication of attacks targeting Linux’s core subsystems.
As OverlayFS becomes fundamental to cloud infrastructure, this advisory underscores the critical need for continuous kernel hardening and proactive patch management in enterprise environments.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…