INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h
Vulnerabilities

CVE-2023-0386

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Linux Kernel OverlayFS Privilege Escalation via Improper Ownership Management
Published: Jun 17, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Linux Kernel Improper Ownership Management Vulnerability — Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

🤖 AI Executive Summary

CVE-2023-0386 is a critical privilege escalation vulnerability in Linux Kernel's OverlayFS subsystem affecting versions prior to 6.2.1. An unprivileged local user can exploit improper UID mapping when copying setuid files with capabilities across mounts to gain root-level privileges. With CVSS 9.0 and active exploits available, this poses immediate risk to all Linux-based infrastructure in Saudi Arabia.

📄 Description (Arabic)

تتعلق الثغرة بآلية إدارة الملكية في نظام ملفات OverlayFS بنواة لينكس، حيث يمكن لمستخدم محلي استغلال خريطة UID غير صحيحة لنسخ ملفات setuid مع قدرات من عمليات تحميل nosuid إلى عمليات تحميل أخرى. يؤدي هذا الاستغلال إلى تنفيذ ملفات بامتيازات مرتفعة دون التحقق الصحيح من الملكية والأذونات. المهاجم المحلي يمكنه الحصول على امتيازات جذر (root) على النظام المتأثر.

🤖 ملخص تنفيذي (AI)

CVE-2023-0386 عبارة عن ثغرة حرجة في نواة لينكس تؤثر على نظام OverlayFS وتسمح لمستخدم محلي غير مميز باستغلال خلل في إدارة معرفات المستخدمين (UID) لتصعيد الامتيازات إلى مستوى الجذر. مع درجة CVSS 9.0 وتوفر استغلالات نشطة، تشكل هذه الثغرة خطراً فورياً على جميع البنية التحتية المستندة إلى لينكس في المملكة العربية السعودية.

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 11:00
🇸🇦 Saudi Arabia Impact Assessment
Critical impact across Saudi critical infrastructure: Banking sector (SAMA-regulated institutions, payment processing systems), Government agencies (NCA, CITC infrastructure), Healthcare systems (MOH hospitals, SEHA), Energy sector (ARAMCO operations, grid management), Telecommunications (STC, Mobily, Zain infrastructure), and Cloud service providers hosting Saudi entities. Linux-based servers, containerized environments, and cloud instances are particularly vulnerable. Exploitation enables complete system compromise and lateral movement across enterprise networks.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare and Medical Services Energy and Utilities Telecommunications Cloud Service Providers Critical Infrastructure Defense and Security
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Linux systems in your environment using 'uname -r' and inventory kernel versions
2. Disable OverlayFS if not required: add 'overlay' to /etc/modprobe.d/blacklist.conf and reboot
3. Restrict local user access and monitor for suspicious privilege escalation attempts

PATCHING GUIDANCE:
1. Update Linux kernel to version 6.2.1 or later immediately
2. For RHEL/CentOS: yum update kernel && reboot
3. For Ubuntu/Debian: apt update && apt upgrade linux-image-generic && reboot
4. For SLES: zypper update kernel-default && reboot
5. Verify patch application: uname -r should show patched version

COMPENSATING CONTROLS (if immediate patching impossible):
1. Implement strict file system permissions: chmod 000 on setuid binaries if unused
2. Use AppArmor/SELinux to restrict OverlayFS mount operations
3. Deploy kernel module signing and secure boot to prevent unauthorized module loading
4. Implement container runtime security policies (restrict privileged containers)
5. Monitor /proc/sys/kernel/unprivileged_userns_clone and disable if not required

DETECTION RULES:
1. Monitor for OverlayFS mount operations: auditctl -w /proc/sys/fs/overlay -p wa
2. Alert on setuid file copies across mounts: monitor inotify events on /tmp and /var/tmp
3. Track privilege escalation attempts: monitor /var/log/auth.log for 'sudo' and 'su' failures
4. Watch for suspicious capability changes: getcap /usr/bin/* | grep cap_setuid
5. Implement HIDS rules for local privilege escalation patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أنظمة لينكس في بيئتك باستخدام 'uname -r' وحصر إصدارات النواة
2. تعطيل OverlayFS إذا لم تكن مطلوبة: أضف 'overlay' إلى /etc/modprobe.d/blacklist.conf وأعد التشغيل
3. تقييد وصول المستخدمين المحليين ومراقبة محاولات تصعيد الامتيازات المريبة

إرشادات التصحيح:
1. تحديث نواة لينكس إلى الإصدار 6.2.1 أو أحدث فوراً
2. لـ RHEL/CentOS: yum update kernel && reboot
3. لـ Ubuntu/Debian: apt update && apt upgrade linux-image-generic && reboot
4. لـ SLES: zypper update kernel-default && reboot
5. التحقق من تطبيق التصحيح: يجب أن يظهر uname -r الإصدار المصحح

الضوابط البديلة (إذا كان التصحيح الفوري غير ممكن):
1. تطبيق أذونات نظام الملفات الصارمة: chmod 000 على الملفات الثنائية setuid إذا لم تكن مستخدمة
2. استخدام AppArmor/SELinux لتقييد عمليات تثبيت OverlayFS
3. تطبيق توقيع وحدات النواة والتشغيل الآمن لمنع تحميل الوحدات غير المصرح بها
4. تطبيق سياسات أمان وقت تشغيل الحاويات (تقييد الحاويات المميزة)
5. مراقبة /proc/sys/kernel/unprivileged_userns_clone وتعطيله إذا لم يكن مطلوباً

قواعد الكشف:
1. مراقبة عمليات تثبيت OverlayFS: auditctl -w /proc/sys/fs/overlay -p wa
2. تنبيه نسخ ملفات setuid عبر التثبيتات: مراقبة أحداث inotify على /tmp و /var/tmp
3. تتبع محاولات تصعيد الامتيازات: مراقبة /var/log/auth.log للفشل في 'sudo' و 'su'
4. مراقبة التغييرات المريبة في الإمكانيات: getcap /usr/bin/* | grep cap_setuid
5. تطبيق قواعد HIDS لأنماط تصعيد الامتيازات المحلية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies ECC 2024 A.5.2.1 - User Registration and Access Rights Management ECC 2024 A.5.3.1 - Management of Privileged Access Rights ECC 2024 A.8.1.1 - Information Security Awareness and Training ECC 2024 A.8.2.1 - Incident Management and Improvement
🔵 SAMA CSF
SAMA CSF ID.AM-2 - Hardware and Software Assets SAMA CSF PR.AC-1 - Access Control Policy SAMA CSF PR.AC-4 - Access Rights and Privileges SAMA CSF DE.CM-1 - System Monitoring SAMA CSF RS.AN-1 - Incident Analysis
🟡 ISO 27001:2022
ISO 27001:2022 A.5.2 - Information Security Policies ISO 27001:2022 A.6.2 - Competence ISO 27001:2022 A.8.1 - User Endpoint Devices ISO 27001:2022 A.8.2 - Privileged Access Rights ISO 27001:2022 A.8.3 - Information Access Restriction ISO 27001:2022 A.8.6 - Access Control for Change Management
🟣 PCI DSS v4.0
PCI DSS 2.1 - Configuration Standards PCI DSS 6.2 - Security Patches PCI DSS 7.1 - Limit Access to System Components PCI DSS 10.2 - Automated Audit Trails
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Linux:Kernel
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS61.56%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-07-08
Published 2025-06-17
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.