Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
eSentire is a sponsor for 451 Nexus.
Join experts from eSentire and VMware Carbon Black as they debunk…
Join Tiff Cook, eSentire's Sr. Director of Incident Response and Bill…
On January 26, 2021, researchers publicly released details for a critical vulnerability affecting the Linux sudo utility, tracked as CVE-2021-3156 (Baron Samedit). The vulnerability can be exploited by a local user to raise permissions to the highest level (root). This vulnerability is highly concerning as exploitation would allow threat actors on a vulnerable system to access sensitive information or download and install additional malicious content.
CVE-2021-3156 is confirmed to exist in the Ubuntu, Debian, and Fedora Linux distributions. It is highly likely that other Linux distributions also contain the vulnerability.
Organizations are encouraged to apply the sudo security patch as soon as possible. Exploitation of CVE-2021-3156 has not been identified in the wild at this time but is expected in the near future.
What we’re doing about it
What you should do about it
CVE-2021-3156 is classified as a heap-based buffer overflow vulnerability. According to the researchers who discovered the vulnerability, it has been present in all versions of sudo since July 2011.
Qualys has released full technical details on the vulnerability including a Proof-of-Concept (PoC) video explaining the attack. Exploitation of CVE-2021-3156 is simple to achieve and is expected to be adopted by threat actors in the near future. Successful exploitation would require the threat actor to have previously gained local privileges on a vulnerable device.