Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
eSentire will be a sponsor at the Seattle CyberSecurity Conference.
eSentire will be a Sponsor at the NetDiligence Cyber Risk Summit in…
eSentire will be presenting and is a Gold Sponsor at the CyberRisk…
THE THREAT:
On January 26, 2021, researchers publicly released details for a critical vulnerability affecting the Linux sudo utility, tracked as CVE-2021-3156 (Baron Samedit). The vulnerability can be exploited by a local user to raise permissions to the highest level (root). This vulnerability is highly concerning as exploitation would allow threat actors on a vulnerable system to access sensitive information or download and install additional malicious content.
CVE-2021-3156 is confirmed to exist in the Ubuntu, Debian, and Fedora Linux distributions. It is highly likely that other Linux distributions also contain the vulnerability.
Organizations are encouraged to apply the sudo security patch as soon as possible. Exploitation of CVE-2021-3156 has not been identified in the wild at this time but is expected in the near future.
What we’re doing about it
What you should do about it
Additional information
CVE-2021-3156 is classified as a heap-based buffer overflow vulnerability. According to the researchers who discovered the vulnerability, it has been present in all versions of sudo since July 2011.
Qualys has released full technical details on the vulnerability including a Proof-of-Concept (PoC) video explaining the attack. Exploitation of CVE-2021-3156 is simple to achieve and is expected to be adopted by threat actors in the near future. Successful exploitation would require the threat actor to have previously gained local privileges on a vulnerable device.
References:
[2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156