On January 26, 2021, researchers publicly released details for a critical vulnerability affecting the Linux sudo utility, tracked as CVE-2021-3156 (Baron Samedit). The vulnerability can be exploited by a local user to raise permissions to the highest level (root). This vulnerability is highly concerning as exploitation would allow threat actors on a vulnerable system to access sensitive information or download and install additional malicious content.
CVE-2021-3156 is confirmed to exist in the Ubuntu, Debian, and Fedora Linux distributions. It is highly likely that other Linux distributions also contain the vulnerability.
Organizations are encouraged to apply the sudo security patch as soon as possible. Exploitation of CVE-2021-3156 has not been identified in the wild at this time but is expected in the near future.
What we’re doing about it
- MVS has multiple local plugins to identify systems vulnerable to CVE-2021-3156
- MVS customers seeking assistance with their review or scans, please contact your MVS consultant or the eSentire Security Operations Center (SOC)
- eSentire security teams continue to track this topic for additional details and detection opportunities
What you should do about it
- After performing a business impact review, update the impacted devices to sudo version 1.9.5p2
CVE-2021-3156 is classified as a heap-based buffer overflow vulnerability. According to the researchers who discovered the vulnerability, it has been present in all versions of sudo since July 2011.
Qualys has released full technical details on the vulnerability including a Proof-of-Concept (PoC) video explaining the attack. Exploitation of CVE-2021-3156 is simple to achieve and is expected to be adopted by threat actors in the near future. Successful exploitation would require the threat actor to have previously gained local privileges on a vulnerable device.