Pakistan Telecommunication Authority (PTA) has issued an urgent cybersecurity advisory regarding a critical vulnerability, CVE-2024-27397, found in the Linux Kernel. The flaw, located within the netfilter subsystem, is classified as a “use-after-free” issue, which poses a significant security threat to systems running vulnerable versions of the Linux Kernel.
This vulnerability allows a locally authenticated attacker to escalate their privileges or even crash the affected system by sending a specially crafted request. The flaw impacts several versions of the Linux Kernel, including versions 6.1, 6.7.0, and 4.1. Given its potential to compromise system integrity, PTA has classified the vulnerability as “High Severity,” highlighting the urgent need for organizations to take immediate action.
The primary risk associated with CVE-2024-27397 is privilege escalation, which could give attackers unauthorized access to critical system functions. This opens the door for exploitation, potentially allowing attackers to gain control over systems and disrupt operations. Systems relying on the affected Linux Kernel versions are particularly vulnerable, making this advisory a crucial reminder for organizations to prioritize timely updates.
PTA is urging system administrators and IT professionals to address the issue without delay. It recommends referring to the Linux Kernel Git Repository for available patches, upgrades, or suggested workarounds. Keeping all systems and software up-to-date with the latest security patches is essential to mitigate the risk of exploitation.
Furthermore, PTA has advised organizations to report any incidents related to this vulnerability through its CERT (Computer Emergency Response Team) portal or via email. By doing so, organizations can help track the issue and prevent further security breaches.
This advisory underscores the ongoing need for vigilance in cybersecurity practices, particularly as attackers continue to exploit known vulnerabilities in widely used software. PTA’s warning serves as a crucial call for organizations to ensure regular updates, proactive security monitoring, and quick responses to emerging threats to safeguard their systems against compromise.