Advisory ID: NCC-CSIRT-2025-007
Summary:
Qualys Threat Research Unit (TRU) recently discovered two interconnected Local Privilege Escalation (LPE) vulnerabilities affecting many mainstream Linux distributions. The issues, tracked as CVE‑2025‑6018 and CVE‑2025‑6019, enable unprivileged users to escalate privileges to root, with CVE‑6019 alone being sufficient to compromise systems with minimal user permissions.
Damage/Probability: HIGH/Critical
Product(s):
-
openSUSE, SUSE Linux
-
Ubuntui
-
Debian
-
Fedora
-
Arch Linux
Version(s):
-
openSUSE Leap 15, SUSE Linux Enterprise 15 (CVE‑6018 & CVE‑6019 chain)
-
Ubuntu (22.04, 24.04 LTS)
-
Debian 12 (Bookworm)
-
Fedora 39/40
-
Arch Linux Rolling‑release distros using udisks2
-
Any other Linux systems deploying unpatched versions of libblockdev/udisks2
Platform(s): Linux OS
Description:
The reported vulnerability involves a local privilege escalation flaw in the udisks2 service, specifically within its libblockdev component. Identified as CVE‑2025‑6019, the flaw allows a local, unprivileged user to gain root access by exploiting insecure handling of device mount operations via the D-Bus interface.
On affected systems, attackers can manipulate mount paths and symbolic links to overwrite or execute files as root. When combined with a second flaw (CVE‑2025‑6018) found in the PAM configuration of SUSE-based distributions, the attack chain becomes easier by automatically granting certain users elevated privileges (marked as active).
The flaw affects multiple Linux distributions, including Ubuntu, Debian, Fedora, and openSUSE. The exploitation requires only local access and standard tools like udisksctl, making it low-complexity but high-impact..
Consequences:
-
A complete local-to-root exploit chain exists, combining both CVEs to achieve full system compromise.
-
CVE‑2025‑6019 alone is exploitable on multiple major distributions, including Ubuntu, Debian, Fedora, and openSUSE Leap 15, even without leveraging CVE‑6018.
-
Recovery from root compromise includes potential for system-wide backdoors, agent tampering, persistence mechanisms, and lateral movement across networks.
Solution:
- Immediate Patching
-
Apply vendor updates for both PAM (for SUSE) and libblockdev/udisks2 across all distributions.
-
Confirm that CVE‑2025‑6019 is patched—even on systems using older versions of udisks2
2. Access Restriction Controls
-
Restrict or tightly control D‑Bus access to udisks2.
-
On shared or multi-user systems, constrain which users can mount or manage devices.
3. Security Policy Reinforcement
-
Reinforce D‑Bus interactions using AppArmor or SELinux to limit udisks2
-
Temporarily disable udisks2 on systems that do not require dynamic device management.
4. Proactive Monitoring
-
Log and inspect all udisksctl invocations and D‑Bus activity related to storage management.
-
Look for anomalous mount operations, symlink manipulations, or unexpected processes invoking udisks2.
5. Patch Chain Dependencies
-
Particularly for SUSE-based systems, patch PAM appropriately to prevent exploitation of CVE‑6018 before CVE‑6019 is leveraged.
References:
-
https://www.infosecurity-magazine.com/news/linux-flaws-allowing-root-access/
-
https://cyberpress.org/privilege-escalation-vulnerabilities/
-
https://securityonline.info/critical-linux-root-exploit-chain-discovered-in-pam-udisks-affecting-major-distros/
-
https://www.securityweek.com/linux-security-new-flaws-allow-root-access-cisa-warns-of-old-bug-exploitation/
-
https://www.blackhatethicalhacking.com/new-linux-vulnerabilities-allow-instant-root-access-across-major-distros/
Advisory ID: ngCERT-2025-050014
Probability: High
Damage: Critical
Platform(s): Web Application
SUMMARY
ngCERT is aware of a critical vulnerability referred to as the Directory Traversal vulnerability. Directory Traversal, also known as Path Traversal or directory climbing, is a web application server flaw that enables attackers to gain unauthorized access to files and directories on a server by manipulating file paths. This flaw arises from weak input validation, which allows attackers to navigate outside the designated directory structure. The severity of the impact can vary, however, it often results in significant consequences such as data breaches or unauthorised system access. Additionally, following best practices like regular vulnerability testing, code audits, and implementing access control is essential for preventing exploitation.
DESCRIPTION
Directory Traversal is a security vulnerability in web application servers caused by an HTTP exploit. It occurs due to weak input validation or insecure file-handling practices. This flaw allows an attacker to manipulate file paths, gaining access to directories and files outside the designated directory structure on a web server. Malicious attackers exploit this vulnerability by manipulating URL paths or parameters through the server’s file system by taking advantage of sequences like “../” (Unix) or “..\” (Windows) and retrieve sensitive information, such as configuration or password files, or other critical data. Directory Traversal can lead to the exposure of sensitive system or application details, unauthorized access to restricted files, and the potential for further attacks that compromise the server or other connected systems.
CONSEQUENCES
Falling prey to these attacks could potentially lead to:
- Authentication Bypass: Directory traversal can be used to bypass authentication mechanisms and gain unauthorized privileges.
- Data Exposure: Confidential information, such as configuration files or user data, may be exposed.
- Unauthorized Access: Attackers gain access to sensitive files and directories.
- Data Manipulation: Attackers can modify or delete critical files, leading to service disruptions.
SOLUTION/MITIGATION
ngCERT recommends the following:
- Minimize network exposure for all control system devices and ensure that they are not accessible from the Internet.
- Implement a location control system, networks and remote devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version. Also, recognize that a VPN is only as secure as the connected devices.
- Perform proper impact analysis and risk assessment before deploying defensive measures.
REFERENCES
Advisory ID: ngCERT-2025-050012
Probability: High
Damage: Critical
Platform(s): Windows operating system
SUMMARY
Lumma Stealer (also known as LummaC2) is a potent and widely distributed information-stealing malware targeting Windows systems. Operated as Malware-as-a-Service (MaaS) via illicit cybercrime markets, it was recently disrupted by Microsoft in response to its escalating threat profile. Lumma Stealer poses a high risk due to its commercial availability, sophisticated evasion, broad data theft capabilities, and network propagation. Its recent disruption highlights active law enforcement attention, but residual infections and potential re-emergence remain concerns. ngCERT urges organizations to reassess their security measures and implement strategies to mitigate infection risks.
DESCRIPTION
Lumma Stealer is a fast-spreading information-stealing malware distributed via underground forums as Malware-as-a-Service (MaaS). It targets Microsoft Windows (MS-Windows) systems through phishing emails, malicious downloads, or cracked software. Once installed, it enables cybercriminals to remotely steal data.
CONSEQUENCES
KEY CHARACTERISTICS & IMPACT:
- Infection Vectors: Primarily spreads through phishing emails, malicious advertisements (malvertising), pirated software, and cracked games. Installs silently, functioning as a backdoor.
- Data Theft: Actively steals sensitive information including:Login credentials (browsers, applications)
- Financial data (banking details, cards)
- Login credentials (browsers, applications)
- Cryptocurrency wallet information
- Browser cookies & session data
- Other confidential files.
- Persistence & Evasion: Employs advanced techniques like code injection and encrypted communication with Command-and-Control (C2) servers to evade detection.
- Lateral Movement: Capable of spreading within compromised networks, amplifying damage.
- Monetisation: Stolen data is typically sold on dark web markets or used directly for financial fraud and identity theft.
Lumma Stealer poses a high risk due to its commercial availability, sophisticated evasion, broad data theft capabilities, and network propagation
SOLUTION/MITIGATION
The following mitigations should be considered:
- User Awareness: Train staff/users to identify phishing attempts and avoid downloading pirated/cracked software.
- Endpoint Protection: Ensure robust, updated anti-malware solutions with behavioral detection capabilities.
- Network Monitoring: Implement monitoring for suspicious outbound traffic (C2 communication) and lateral movement attempts.
- Patch Management: Keep all systems and software rigorously updated.
- Least Privilege: Enforce strict access controls to limit the impact of lateral movement.
Assessment: Lumma Stealer represents a significant ongoing threat to organizational and personal data security, requiring vigilant defensive measures.
REFERENCES
zAdvisory ID: ngCERT-2025-050011
Probability: High
Damage: Critical
Platform(s): Cisco Routers
SUMMARY
ngCERT confirms a 30% increase in sextortion attacks (Oct 2024 – Mar 2025), with 54,000+ cases reported in 2024. Nigerian-based threat actors are extorting victims for $500–$10,000 via social/dating platforms (Instagram, WhatsApp, TikTok, Snapchat). Perpetrators use sophisticated grooming tactics to coerce explicit content, triggering cycles of financial/emotional exploitation.
DESCRIPTION
ATTACK CHAIN
- Grooming Phase:
- Fake profiles (attractive peers) initiate contact → Rapid trust-building via flirtation
- Content Extraction:
- Coercion into sharing intimate media through emotional manipulation
- Monetization:
- Threats to distribute content unless paid → Continued demands even after payment
CONSEQUENCES
Successful exploitation could lead to:
- Financial Ruin: Extortion cycles draining the victim's resources
- Reputational Destruction: Non-consensual sharing of private media
- Severe Psychological Trauma: Depression, anxiety, suicidal ideation
- Permanent Privacy Violation: Loss of digital autonomy.
SOLUTION/MITIGATION
For Individuals:
For Individuals:
🔒 Prevent Exposure:
- NEVER share intimate content online, regardless of trust level
- REJECT video calls/explicit conversations with unknown contacts
- LOCK DOWN social media: Enable 2FA, set profiles to private
🚨 If Targeted: - DO NOT PAY – Payment guarantees continued extortion
- PRESERVE EVIDENCE: Screenshot chats/profile details (DO NOT delete accounts)
- BLOCK & REPORT: Submit via ngCERT Portal
For Institutions:
🎓 Mandate Digital Literacy: - Integrate sextortion prevention into school curricula (ages 12+)
- Train educators to identify grooming behaviours
⚖️ Enhance Law Enforcement: - Deploy cryptocurrency tracing for ransom tracking
- Coordinate with INTERPOL for cross-border actor disruption
VICTIM SUPPORT
Immediate Assistance:
- ngCERT Hotline: 090 5555 4499
- Emergency Email: incident@cert.gov.ng/" id="OWAf051b667-128a-5b06-fd5f-0b39402b14d1" class="x_OWAAutoLink" style="border: 0px; font: inherit; margin: 0px; padding: 0px; vertical-align: baseline;" title="https://mailto:/" data-linkindex="1" data-auth="NotApplicable">
✊ Key Message: Sextortion is a crime – NOT your fault. ngCERT stands with victims.
WHY ACT NOW?
This 30% YoY surge reflects organised Nigerian cybercrime networks weaponising social platforms. Without intervention, 2025 cases will
exceed 70,000. Proactive education + rapid reporting are critical to break exploitation cycles.
🔍 Behavioural Red Flags:
- Rapid escalation from casual chat to sexual topics.
- Requests to move conversations off-platform.
- "You can trust me" insistence after minimal interaction.
REFERENCES
Advisory ID: ngCERT-2025-050005
SUMMARY
ngCERT is aware of Cisco’s declaration of product End-of-Life (EoL) and End-of-Support (EoS) for Cisco Catalyst 1900, 2900, and 3900 series routers. This implies that Cisco no longer sells or supports the affected devices; hence, software/firmware updates, security patches, and bug fixes will cease. Additionally, technical support and warranty services are discontinued, while hardware replacement/services may become unavailable. The continued use of these devices is liable to introduce significant operational and security risks as well as compliance violations to enterprise and government networks. This advisory, therefore, highlights the security risks and consequences associated with the continued use of Cisco Catalyst 1900, 2900, and 3900 Series Routers and provides mitigation strategies for organizations and individuals.
Probability: High
Damage: Critical
Platform(s): Cisco Routers
DESCRIPTION
The Cisco Catalyst 1900, 2900, and 3900 routers, widely deployed in enterprise environments, have long since passed their official EoL milestones, implying that Cisco has discontinued all software updates, security patches, and hardware support for these devices as follows.
- Catalyst 1900 Series: End-of-Support Date - 31-May-2025
- Catalyst 2900 Series: End-of-Support Date - 31-Dec-2022
- Catalyst 3900 Series: End-of-Support Date- 31-Dec-2022.
Organizations with Cisco Catalyst 1900, 2900, and 3900 series routers deployed past their EoL and EoS dates are vulnerable to known exploits such as CVE-1999-1129, CVE-2015-0586, and CVE-2017-6742, making them prime targets for malware, ransomware, and unauthorized access. Troubleshooting becomes difficult without vendor support, scarcity of spare parts, and compatibility with modern protocols are limited. Additionally, as these routers age, the risk of sudden failure increases, potentially disrupting critical operations. The risks of maintaining these legacy systems far outweigh any perceived cost savings, making timely upgrades essential. Furthermore, outdated encryption and weak authentication further expose networks to threats.
CONSEQUENCES
Successful exploitation could lead to:
- Unpatched Exploits: These routers do not receive security updates, making them vulnerable to known and zero-day exploits.
- Regulatory & Compliance Violations: Non-compliance with standards like PCI DSS, HIPAA, or NIST due to insecure infrastructure. This could lead to fines, audits, or loss of certifications in regulated industries.
- Operational Instability: Hardware failure risks increase due to ageing components.
- Network Performance Degradation: Poor integration with newer systems or cloud services.
- Increased Attack Surface: Devices may be targeted by automated botnets or lateral movement in APT campaigns.
SOLUTION/MITIGATION
ngCERT recommends the following:
- Patch Immediate Device Assessment: Inventory all existing Cisco Catalyst 1900/2900/3900 routers and identify devices exposed to external networks or critical infrastructure segments.
- Replace and Upgrade to Supported Hardware: Plan and execute migration to currently supported Cisco platforms (e.g., Catalyst 9000 Series, ISR 4000 Series). Choose models that support modern standards or consider alternatives from other vendors.
- Network Segmentation & Isolation: If decommissioning is delayed, isolate these devices in a separate VLAN with strict access controls and monitor traffic for anomalies using intrusion detection systems (IDS).
- Disable unused services and interfaces: Turn off Telnet, HTTP, SNMPv1/2, and other outdated protocols in favor of SSH, HTTPS, and SNMPv3.
- Update Network Policies: Modify procurement and lifecycle management policies to decommission unsupported devices proactively.
- Align network hardware lifecycle with cybersecurity and compliance frameworks (e.g., NIST, ISO 27001).
REFERENCES
- ESCALATION OF SIDEWINDER (APT GROUP) CYBER ESPIONAGE CAMPAIGNS TARGETING CRITICAL SECTORS IN AFRICA AND ASIA
- New 'Defendnot' Tool Exploits Windows to Disable Microsoft Defender
- CRITICAL FLAW IN APPLE’S PASSWORD APP EXPOSING USERS TO PHISHING ATTACKS
- SECURITY IMPLICATIONS OF MICROSOFT’S DISCONTINUATION OF SUPPORT FOR WINDOWS 10 OPERATING SYSTEM