Home » New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

by David Chen
2 minutes read

In a recent discovery that has sent ripples through the Linux community, cybersecurity researchers at Qualys have unearthed two critical local privilege escalation (LPE) vulnerabilities. These flaws have the potential to grant malicious actors full root access on systems running major Linux distributions, posing a significant threat to security.

The first vulnerability, identified as CVE-2025-6018, enables an escalation from an unprivileged user to the allow_active state within SUSE 15’s Pluggable Authentication Modules (PAM). This particular flaw opens the door for attackers to advance their privileges and ultimately gain root access, effectively compromising the entire system.

The second vulnerability, denoted as CVE-2025-6019, further exacerbates the situation by allowing an escalation from the allow_active state to root access via Udisks. This double whammy of vulnerabilities across critical components of the Linux ecosystem underscores the importance of prompt mitigation efforts to safeguard systems against potential exploitation.

The impact of these vulnerabilities extends across a wide range of major Linux distributions, necessitating a unified response from the community to address the underlying issues. With the potential for unauthorized access to sensitive data and system resources, the stakes are undeniably high, requiring immediate action to shore up defenses and prevent potential breaches.

In light of these vulnerabilities, it is crucial for system administrators and IT professionals to stay informed about security updates and patches released by vendors. By promptly applying these fixes, organizations can proactively protect their systems against potential exploitation and mitigate the risks posed by these LPE flaws.

Furthermore, conducting thorough security assessments and implementing best practices for secure configuration management can help bolster defenses against similar vulnerabilities in the future. By adopting a proactive approach to cybersecurity, organizations can fortify their systems and reduce the likelihood of falling victim to malicious attacks.

As the cybersecurity landscape continues to evolve, staying vigilant and proactive is essential to safeguarding critical systems and data against emerging threats. By staying informed, implementing robust security measures, and collaborating with the broader community, organizations can effectively defend against potential exploits and uphold the integrity of their Linux environments.

In conclusion, the discovery of these LPE vulnerabilities serves as a stark reminder of the ever-present cybersecurity risks facing the Linux ecosystem. By taking proactive steps to address these vulnerabilities and enhance overall security posture, organizations can mitigate potential threats and uphold the resilience of their systems in the face of evolving cybersecurity challenges.

You may also like