Patch

CVE-2024-1086

with vRx

Vulnerability Overview
CVE Name
CVE-2024-1086
Severity
7.8
High
CVE Description
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_...
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_...
Show more
Show less
Latest Patch info
There is no patch available at the moment, but you can use our script.
Patch Name
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Date
27.06.2024
Script
Script Type
Remediation script
🔒 Critical CVE-2024-1086 Remediation Script This script ensures that your system is safeguarded against potential exploits by effectively disabling user namespaces and nf_tables, thereby mitigating the risks associated with this vulnerability. 🔍 How the Script Works: Disabling User Namespaces: The script first checks if user namespaces are enabled using sysctl -n kernel.unprivileged_userns_clone. If enabled, it sets kernel.unprivileged_userns_clone to 0, effectively disabling user namespaces. This change is also made persistent by updating /etc/sysctl.conf. Disabling nf_tables: It verifies if nf_tables is enabled by inspecting the kernel configuration. If enabled, it modifies the GRUB boot parameters to disable nf_tables by adding nftables.disable=1 and updates the GRUB configuration. Verifying Changes: The script confirms that user namespaces are disabled and nf_tables is not enabled in the kernel configuration, ensuring the system is secure. Error Handling: Robust error handling is included to catch any issues during script execution, providing clear feedback and exiting with an error status if necessary. ⚠️ Why It Matters: CVE-2024-1086 is a critical vulnerability that poses a significant risk to your systems by allowing attackers to exploit user namespaces and nf_tables for unauthorized access and malicious activities. Implementing this remediation script is crucial for the following reasons: Preventing Privilege Escalation: By disabling user namespaces, the script prevents potential privilege escalation exploits that could give attackers control over the system. Mitigating Network Attacks: Disabling nf_tables helps protect against network-based attacks, ensuring your system's network traffic cannot be maliciously manipulated. References: https://ubuntu.com/security/CVE-2024-1086 Stay safe.
🔒 Critical CVE-2024-1086 Remediation Script This script ensures that your system is safeguarded against potential exploits by effectively disabling user namespaces and nf_tables, thereby mitigating the risks associated with this vulnerability. 🔍 How the Script Works: Disabling User Namespaces: The script first checks if user namespaces are enabled using sysctl -n kernel.unprivileged_userns_clone. If enabled, it sets kernel.unprivileged_userns_clone to 0, effectively disabling user namespaces. This change is also made persistent by updating /etc/sysctl.conf. Disabling nf_tables: It verifies if nf_tables is enabled by inspecting the kernel configuration. If enabled, it modifies the GRUB boot parameters to disable nf_tables by adding nftables.disable=1 and updates the GRUB configuration. Verifying Changes: The script confirms that user namespaces are disabled and nf_tables is not enabled in the kernel configuration, ensuring the system is secure. Error Handling: Robust error handling is included to catch any issues during script execution, providing clear feedback and exiting with an error status if necessary. ⚠️ Why It Matters: CVE-2024-1086 is a critical vulnerability that poses a significant risk to your systems by allowing attackers to exploit user namespaces and nf_tables for unauthorized access and malicious activities. Implementing this remediation script is crucial for the following reasons: Preventing Privilege Escalation: By disabling user namespaces, the script prevents potential privilege escalation exploits that could give attackers control over the system. Mitigating Network Attacks: Disabling nf_tables helps protect against network-based attacks, ensuring your system's network traffic cannot be maliciously manipulated. References: https://ubuntu.com/security/CVE-2024-1086 Stay safe.
Affected OS & Apps
Linux Kernel
by
Linux
Debian Linux
by
Debian
Fedora
by
Fedoraproject
Show more
4.8

Patch faster and smarter
with vRx

Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

More than 600 customers trust vRx:

Solution

‍Remediate faster with vRx

Patch Management

vRx automatically deploys patches across all systems, cutting patching time by 80%.

Scripting Engine

vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.

Patchless Protection

vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.
Shortlist 2024 by Captera
4.9
Customer first by Gartner
4.8
Leader spring by G2
4.9

Hear from our Customers

EL AL secures global Patch Compliance

“Within two weeks we decided on Vicarius. Patch scheduling is now a one-day task instead of a full-time job.”
Tal ShacharTal Shachar
Tal Shachar
Deputy Director, Infrastructure, EL AL Airlines

Complete Vulnerability Remediation Platform

"What stood out was that it wasn’t just a scanner or a patch manager. It was an entire remediation platform. You discover vulnerabilities, prioritize based on real risk, and remediate automatically."
Eric DowslandEric Dowsland
Eric Dowsland
Chief Customer Officer

Não espere até que o WSUS seja completamente descontinuado.

Não espere até que o WSUS seja completamente descontinuado. Agende uma demonstração e descubra como o vRx pode transformar sua estratégia de gerenciamento de patches.
Billy TurnerBilly Turner
Billy Turner
VP de Tecnologia e Serviços Gerenciados​

Valuable resources saved

"Before vRx, we would spend countless hours manually finding and verifying patches. We saved so much time (and headache!)."
Anonymous IT Operations LeadAnonymous IT Operations Lead
Anonymous IT Operations Lead
IT Operations Lead

Third-party software patching is the most valuable feature.

"We have automated third-party patching on specific software, improving efficiency by 80%. vRx has reduced our patching time, which has improved our operations. It is more robust than other solutions because it offers better third-party remediation."
Billy TurnerBilly Turner
Billy Turner
VP, Managed Technology & Services

Single source of truth, capable of handling any application in our fleet

"vRx gives a single pane of glass to see what patches needed to go out and what sort of vulnerabilities we have on our Windows machines. Our meantime to remediate vulnerabilities has gone down by about 60% to 70%."
Peter FallowfieldPeter Fallowfield
Peter Fallowfield
IT Manager

60% faster remediation, many hours saved

"Typically, with our previous solution of ManageEngine, it took about three hours to patch Windows Server, and now, that is less than an hour. It means less downtime for the business each month when we do patches."
Anonymous Security AnalystAnonymous Security Analyst
Anonymous Security Analyst
Security Analyst

Great patching capabilities, helpful dashboard, and excellent support

"vRx has saved us an incredible amount of time. We can just rely on the automated system and the schedules we've set. It's a huge time saver. It's saved us hundreds of hours."
Michael CortezMichael Cortez
Michael Cortez
Sr. Director of IT

My favorite feature is Patchless Protection

"With Vicarius' vRx, I've never seen a patch that failed or had to be rolled back. We're saving quite a bit of time. Our clients using vRx haven't had any issues, and they've easily established patching for all their endpoints. "
Jeremy HermanJeremy Herman
Jeremy Herman
Security Engineer

Unified vulnerability discovery, prioritization, and remediation

"Vicarius streamlines vulnerability management between IT & Security by directly linking identified vulnerabilities to required patches, enhancing efficiency. The automation process has saved at least 30 percent of our manual tasks."
Wayne AjimineWayne Ajimine
Wayne Ajimine
Information Security Professional

Patchless Protection is an incredible technology!

"vRx reduces the time customers spend on patching by reducing the overhead on the administrators, allowing them to do additional work. It saves time they would spend addressing the patching process, follow-ups, etc."
Antwune GrayAntwune Gray
Antwune Gray
VP IT Security and Services

Merge Security & IT to Remediate Threats

“Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow."
Oshri CohenOshri Cohen
Oshri Cohen
CISO
Tanya Alfonso
4.8

Automated Patching, Scripting, and more

Talk with our team to get a personal walkthrough
Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.