<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Incidents archivos - Geko Cloud</title>
	<atom:link href="https://geko.cloud/en/blog/incidents/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Servicios de consultoría cloud y devops</description>
	<lastBuildDate>Thu, 17 Mar 2022 09:54:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.7</generator>

<image>
	<url>https://geko.cloud/wp-content/uploads/2021/08/cropped-geko-fav-150x150.png</url>
	<title>Incidents archivos - Geko Cloud</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Security incident with a kubernetes container escape kernel bug</title>
		<link>https://geko.cloud/en/security-incident-with-kubernetes-container-escape/</link>
					<comments>https://geko.cloud/en/security-incident-with-kubernetes-container-escape/#respond</comments>
		
		<dc:creator><![CDATA[Geko Cloud]]></dc:creator>
		<pubDate>Wed, 26 Jan 2022 16:16:55 +0000</pubDate>
				<category><![CDATA[Incidents]]></category>
		<guid isPermaLink="false">https://geko.cloud/?p=7067</guid>

					<description><![CDATA[<p>A high-risk container escape vulnerability has surfaced in the related to Kubernetes pods which allows a user with a shell to get all kernel capabilities inside the container and potentially use it to escape the container into the host. This vulnerability (CVE CVE-2022-0185) is, to our knowledge, not being exploited in the wild as of January [&#8230;]</p>
<p>La entrada <a href="https://geko.cloud/en/security-incident-with-kubernetes-container-escape/">Security incident with a kubernetes container escape kernel bug</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A high-risk <strong>container escape vulnerability</strong> has surfaced in the <span style="font-weight: 400;">related to Kubernetes pods which <strong>allows a user with a shell to get all kernel capabilities inside the container</strong> and potentially use it to <strong>escape the container into the host</strong><b>. </b>This vulnerability (CVE <strong>CVE-2022-0185</strong>) is, to our knowledge, <strong>not being exploited in the wild</strong> as of January 26th 2022, however the group that discovered it will provide more information about it the coming week, which will <strong>start to surface proofs of concept</strong> and begin representing a threat. Major linux distributions have started distributing <strong>kernel patches</strong> which solve this issue.</span></p>
<h3><b>Reach</b></h3>
<p><span style="font-weight: 400;">This vulnerability is exploitable <strong>from a linux shell session on a Kubernetes container</strong>. It is not a first step in an exploit chain, but it makes privilege <strong>escalation to having all kernel capabilities trivial</strong>, which means it can bring a higher risk in systems exposed to the internet with vulnerable software (like a popular CMS or CRM) by enabling a longer, more dangerous exploit chain. </span><span style="font-weight: 400;"><b>all kernel versions since 5.1-rc1 are affected </b>through the latest patches (5.4.173, 5.10.93, 5.15.1), however major distributions are already distributing patches on their kernels.</span></p>
<h3><b>Indicators of Compromise</b></h3>
<p><strong>No clear indicators of compromise</strong> are known as of yet, but a possible check is to <strong>look for what kernel capabilities processes have</strong>, and see if any unusual process has an unusual amount of kernel capabilities.</p>
<h3><b>Patches and mitigations</b></h3>
<p><strong>Kernel patches are being released</strong> by major linux distributions to mitigate this issue and should be applied as soon as possible. If a debian-based distribution does not have an available patch yet, this vulnerability <strong>can be mitigated by disabling unprivileged kernel namespaces</strong>:</p>
<pre><code>sysctl -w kernel.unprivileged_userns_clone=0</code></pre>
<p>This way only privileged pods and containers will be able to escalate their kernel capabilities (Which is as per design for the privilege level specified).</p>
<h3><b>Sources</b></h3>
<p><a href="https://www.bleepingcomputer.com/news/security/linux-kernel-bug-can-let-hackers-escape-kubernetes-containers/">https://www.bleepingcomputer.com/news/security/linux-kernel-bug-can-let-hackers-escape-kubernetes-containers/</a></p>
<p><a href="https://sysdig.com/blog/cve-2022-0185-container-escape/">https://sysdig.com/blog/cve-2022-0185-container-escape/</a></p>
<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185</a></p>
<p>&nbsp;</p>
<h2><strong>Geko Cloud</strong></h2>
<p id="tw-target-text" class="tw-data-text tw-text-large tw-ta" dir="ltr" data-placeholder="Traducción"><span class="Y2IQFc" lang="en"><a href="https://geko.cloud/es/" target="_blank" rel="noopener">Geko Cloud Consulting</a> we are up to date with any incident or vulnerability. If you want to have your data safe, you need us!</span></p>
<p>La entrada <a href="https://geko.cloud/en/security-incident-with-kubernetes-container-escape/">Security incident with a kubernetes container escape kernel bug</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://geko.cloud/en/security-incident-with-kubernetes-container-escape/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security incident with the pkexec linux privilege escalation binary</title>
		<link>https://geko.cloud/en/security-incident-with-the-pkexec-linux-privilege-escalation-binary/</link>
					<comments>https://geko.cloud/en/security-incident-with-the-pkexec-linux-privilege-escalation-binary/#respond</comments>
		
		<dc:creator><![CDATA[Geko Cloud]]></dc:creator>
		<pubDate>Wed, 26 Jan 2022 09:59:45 +0000</pubDate>
				<category><![CDATA[Incidents]]></category>
		<guid isPermaLink="false">https://geko.cloud/?p=7054</guid>

					<description><![CDATA[<p>A high-risk privilege escalation vulnerability has surfaced in the pkexec terminal tool that controls privilege escalation in Linux shells and is pre-installed in all major Linux distributions like Debian, CentOS or Ubuntu. This vulnerability allows users with a limited privilege terminal session to escalate into full privileges in the local machine, effectively getting root access. [&#8230;]</p>
<p>La entrada <a href="https://geko.cloud/en/security-incident-with-the-pkexec-linux-privilege-escalation-binary/">Security incident with the pkexec linux privilege escalation binary</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">A <strong>high-risk privilege escalation vulnerability</strong> has surfaced in the <strong>pkexec terminal tool</strong> that controls privilege escalation in Linux shells and is <strong>pre-installed in all major Linux distributions</strong> like Debian, CentOS or Ubuntu. This vulnerability <strong>allows users with a limited privilege terminal session to escalate into full privileges in the local machine</strong>, effectively getting root access. This vulnerability is <strong>trivially exploited</strong> and already has <strong>proof of concept exploits in circulation</strong>. All versions of the pkexec utility since it launched in 2009 are vulnerable, however major distributions are already distributing patches on their repositories.</span></p>
<h2><b>Reach</b></h2>
<p><span style="font-weight: 400;">This vulnerability is exploitable <strong>from any Linux user terminal session</strong>. It is not a first step in an exploit chain, but it makes privilege <strong>escalation from an unprivileged shell trivial</strong>, which means it can bring a higher risk in systems exposed to the internet with vulnerable software (like a popular CMS or CRM) by enabling a longer, more dangerous exploit chain. <strong>All versions of the pkexec utility since it launched in 2009 are vulnerable</strong>, however major distributions are already distributing patches on their repositories.</span></p>
<h2><b>Indicators of Compromise</b></h2>
<p><span style="font-weight: 400;">A <strong>possible indicator of compromise</strong> for this vulnerability is a <strong>log entry</strong> that contains the string “</span><span style="font-weight: 400;">The value for the SHELL variable was not found the /etc/shells file</span><span style="font-weight: 400;">”. Searching for this text on the system logs can be an indicator that the vulnerability was exploited on that local system where the logs are being analyzed.</span></p>
<h2><b>Patches and mitigations</b></h2>
<p><span style="font-weight: 400;">All versions of the pkexec utility since it launched in 2009 are vulnerable, however <strong>major distributions are already distributing patches</strong> on their repositories. You can <strong>update pkexec from the system’s package manager</strong> to patch this vulnerability. If no patch is available for your distribution yet, <strong>the binary’s privilege escalation can be disabled</strong> by removing the SUID bit from the binary file: chmod 0755 pkexec </span></p>
<p>&nbsp;</p>
<h2><b>Sources</b></h2>
<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034"><span style="font-weight: 400;">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034</span></a></p>
<p><a href="https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"><span style="font-weight: 400;">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</span></a></p>
<p><a href="https://isc.sans.edu/diary/rss/28272"><span style="font-weight: 400;">https://isc.sans.edu/diary/rss/28272</span></a></p>
<p>La entrada <a href="https://geko.cloud/en/security-incident-with-the-pkexec-linux-privilege-escalation-binary/">Security incident with the pkexec linux privilege escalation binary</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://geko.cloud/en/security-incident-with-the-pkexec-linux-privilege-escalation-binary/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security incident in the log4j Java logging library</title>
		<link>https://geko.cloud/en/security-incident-in-the-log4j-java-logging-library/</link>
					<comments>https://geko.cloud/en/security-incident-in-the-log4j-java-logging-library/#respond</comments>
		
		<dc:creator><![CDATA[Geko Cloud]]></dc:creator>
		<pubDate>Wed, 22 Dec 2021 15:20:58 +0000</pubDate>
				<category><![CDATA[Incidents]]></category>
		<guid isPermaLink="false">https://geko.cloud/?p=6860</guid>

					<description><![CDATA[<p>We have detected a critical security vulnerability in a Java logging library widely used in very extended open source projects like Jenkins, ElasticSearch or Apache Solr. This vulnerability, with CVE CVE-2021-44228, implies a level 9 risk in the CVSS vulnerability grading scale in terms of ease of exploiting and reach, which classifies it as a [&#8230;]</p>
<p>La entrada <a href="https://geko.cloud/en/security-incident-in-the-log4j-java-logging-library/">Security incident in the log4j Java logging library</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We have detected a critical security vulnerability in a Java logging library widely used in very extended open source projects like Jenkins, ElasticSearch or Apache Solr. This vulnerability, with CVE CVE-2021-44228, implies a level 9 risk in the CVSS vulnerability grading scale in terms of ease of exploiting and reach, which classifies it as a critical vulnerability. This allows the attacker to, in a trivial way and without the need of authentication, to remotely execute code in an application that uses this library to generate internal log entries.</p>
<p>There is the possibility to disable the function that allows this vulnerability to be exploted (JNDI) with environment variables in some versions of the library, but the long-term solution is to patch the log4j library to version 2.17.0.</p>
<h2>Reach</h2>
<p>This vulnerability has a very wide reach into several applications widely used in the technology stack of modern companies. A complete list of currently known affected software can be seen on  <a href="https://github.com/cisagov/log4j-affected-db#software-list">CISA</a>&#8216;s github repository about the issue. This list will be updated as new software is discovered to be vulnerable.</p>
<h2>Threat hunting and mitigation</h2>
<p>It is possible to mitigate this vulnerability by disabling the JNDI lookup library that makes this attack possible with environrment variables, or deleting the java library entirely from the included functions inside the jar file which will make this impossible to exploit. These, however, are temporary patches, and the definitive solution to include on your roadmap is to update to log4j 2.17.0 as soon as possible.</p>
<p>You can investigate common post-exploitation trails and vulnerable log4j library entries with our in-house <a href="https://github.com/GekoCloud/common-ioc-data-gathering">scanning tool script</a> that has been developed to log detections of common post-exploitation trails in your scanned system, and to scan for any log4j libraries that exist on your filesystem and are vulnerable to this CVE&#8217;s.</p>
<h3>Update 1: 2021-12-14</h3>
<p>It has been discovered that Apache&#8217;s fix for this CVE in log4j 2.16.0 was incomplete in some non-default configurations and it still allowed to remotely execute code in some configurations. It is recommended to upgrade to log4j 2.17.0 as soon as possible to avoid being affected by this vulnerability.</p>
<p>La entrada <a href="https://geko.cloud/en/security-incident-in-the-log4j-java-logging-library/">Security incident in the log4j Java logging library</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://geko.cloud/en/security-incident-in-the-log4j-java-logging-library/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SSL Root Certificates Let&#8217;s encrypt Issue</title>
		<link>https://geko.cloud/en/ssl-root-certificates-lets-encrypt-issue/</link>
					<comments>https://geko.cloud/en/ssl-root-certificates-lets-encrypt-issue/#respond</comments>
		
		<dc:creator><![CDATA[Jose Luis Sánchez]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 12:30:24 +0000</pubDate>
				<category><![CDATA[Featured post]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Labs]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[letsencrypt]]></category>
		<guid isPermaLink="false">https://geko.cloud/?p=3593</guid>

					<description><![CDATA[<p>We have detected an issue regarding letsencrypt certificate CA trust regarding a CA certificate that expired yesterday 30/09/2021. This issue consists on that clients will wrongly identify correct, valid certificates as invalid, because the CA they are based on is now invalid and the client software was not updated to trust the new CA, so [&#8230;]</p>
<p>La entrada <a href="https://geko.cloud/en/ssl-root-certificates-lets-encrypt-issue/">SSL Root Certificates Let&#8217;s encrypt Issue</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">We have detected an issue regarding letsencrypt certificate CA trust regarding a CA certificate that expired yesterday 30/09/2021.</span></p>
<p><span style="font-weight: 400;"> This issue consists on that clients will wrongly identify correct, valid certificates as invalid, because the CA they are based on is now invalid and the client software was not updated to trust the new CA, so it is now giving these authentication problems. We have identified that this is a problem with older software clients like curl, or older versions of programming languages like php that do not have this CA installed in them and thus fail to access clients with letsencrypt certificates. </span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Scope</span></h2>
<h3><span style="font-weight: 400;">Affected software versions</span></h3>
<p><span style="font-weight: 400;">&#8211; OpenSSL &lt;= 1.0.2</span></p>
<p><span style="font-weight: 400;">&#8211; Windows &lt; XP SP3</span></p>
<p><span style="font-weight: 400;">&#8211; macOS &lt; 10.12.1</span></p>
<p><span style="font-weight: 400;">&#8211; iOS &lt; 10 (iPhone 5 is the lowest model that can get to iOS 10)</span></p>
<p><span style="font-weight: 400;">&#8211; Android &lt; 7.1.1 (but &gt;= 2.3.6 will work if served ISRG Root X1 cross-sign)</span></p>
<p><span style="font-weight: 400;">&#8211; Mozilla Firefox &lt; 50</span></p>
<p><span style="font-weight: 400;">&#8211; Ubuntu &lt; 16.04</span></p>
<p><span style="font-weight: 400;">&#8211; Debian &lt; 8</span></p>
<p><span style="font-weight: 400;">&#8211; Java 8 &lt; 8u141</span></p>
<p><span style="font-weight: 400;">&#8211; Java 7 &lt; 7u151</span></p>
<p><span style="font-weight: 400;">&#8211; NSS &lt; 3.26<br />
-CDN like Cloudflare</span></p>
<p><span style="font-weight: 400;">&#8211; Amazon FireOS (Silk Browser)</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">This is an effect that can not only be felt by users or client applications, but by the application itself. For example, if your application is running on a system using a version lower than the detailed above, like a webserver with openssl 1.0.1, requests to any letsencrypt-backed service will fail. </span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Remediation</span></h2>
<p><span style="font-weight: 400;">Solution to this problem is to upgrade the client version of the software stack so it trusts the new root CA as a full solution. You can also patch the issue by modifying your software so it doesn’t check the validity of the CA, although keep in mind that this should be a temporary solution as it is an insecure software practice and should not be left applied in a production environment more time than necessary.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Here’s more technical information about this issue:</span></p>
<p><a href="https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/"><span style="font-weight: 400;">https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/</span></a></p>
<p>La entrada <a href="https://geko.cloud/en/ssl-root-certificates-lets-encrypt-issue/">SSL Root Certificates Let&#8217;s encrypt Issue</a> se publicó primero en <a href="https://geko.cloud/en/">Geko Cloud</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://geko.cloud/en/ssl-root-certificates-lets-encrypt-issue/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
