How To Fix The Polkit Privilege Escalation Vulnerability (CVE-2021–4034)

What Is Polkit?

About The Polkit Privilege Escalation Vulnerability (CVE-2021–4034):

Linux Distributions Affected By The Polkit Privilege Escalation Vulnerability (CVE-2021–4034):

Major Linux Distributions Affected By The Polkit Privilege Escalation Vulnerability Are:

RedHat:

  • Red Hat Enterprise Linux 6
  • Red Hat Enterprise Linux 7
  • Red Hat Enterprise Linux 8
  • Red Hat Virtualization 4

Ubuntu:

  • Ubuntu 21.10
  • Ubuntu 20.04
  • Ubuntu 18.04
  • Ubuntu 16.04
  • Ubuntu 14.04

Suse:

  • HPE Helion Openstack 8
  • SUSE CaaS Platform 4.0
  • SUSE Enterprise Storage 6
  • SUSE Enterprise Storage 7
  • SUSE Linux Enterprise High Performance Computing 15
  • SUSE Linux Enterprise Micro 5
  • SUSE Linux Enterprise Module for Basesystem 15
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server 15
  • SUSE Linux Enterprise Server for SAP Applications 12
  • SUSE Linux Enterprise Server for SAP Applications 15
  • SUSE Linux Enterprise Software Development Kit 12
  • SUSE Manager Proxy 4
  • SUSE OpenStack Cloud 8
  • SUSE OpenStack Cloud 9
  • SUSE OpenStack Cloud Crowbar 8
  • SUSE OpenStack Cloud Crowbar 9
  • openSUSE Leap 15

How To Test The Polkit Privilege Escalation Vulnerability (CVE-2021–4034)?

  1. Install Git
    $ sudo apt install git (On Ubuntu)
    $ sudo yum install git (On RHEL)
  2. Clone the exploit script from Github
    $ git clone https://github.com/berdav/CVE-2021-4034.git
  3. Change directory into ‘CVE-2021–4034’
    $ cd CVE-2021–4034/
  4. Compile the script using ‘make’ command
    $ make
  5. Test the Polkit Privilege Escalation Vulnerability
    $ ./cve-2021–4034

How To Discover Assets Vulnerable To Polkit Privilege Escalation Vulnerability?

How To Fix The Polkit Privilege Escalation Vulnerability (CVE-2021–4034)?

$ sudo apt install <package name>
$ sudo yum install <package name>

Use These Command If You Want To Update The System:

$ sudo apt update && sudo apt upgrade $ sudo yum update && sudo yum upgrade
$ chmod 0755 /usr/bin/pkexec

--

--

--

We are here to create awareness about cyber security.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to hack into a Phone Camera Kali Linux

The Quarantine Survival Kit: Business Edition

Phantom Installs

EOSC Referral Program

📣Bamboo Trading Promotion with 100,000 USDT Giveaway! Trade Bamboo to Win a Big Prize!

OAuth for Mobile Apps: Security Challenges and Solutions

Standard Protocol Partners Showcase — HAPI

{UPDATE} Castle of Illusion Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thesecmasterblog

Thesecmasterblog

We are here to create awareness about cyber security.

More from Medium

A Detailed Understanding Of What Exactly Cryptocurrency Is And How Does It Work

Container Security-Common issues

Linux Privilege Escalation Resources

Privilege Escalation in Linux Systems