{"id":1749,"date":"2019-01-29T00:00:00","date_gmt":"2019-01-29T08:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux"},"modified":"2025-06-12T05:15:46","modified_gmt":"2025-06-12T12:15:46","slug":"azure-security-center-can-detect-emerging-vulnerabilities-in-linux","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/","title":{"rendered":"Azure Security Center can detect emerging vulnerabilities in Linux"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Recently a new flaw was discovered in PolKit &#8211; a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged account to have root permission. In this blog post, we will focus on the recent vulnerability, demonstrate how attacker can easily abuse and weaponize it. In addition, we will preset how Azure Security Center can help you detect threats, and provide recommendations for mitigation steps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-polkit-vulnerability\">The PolKit vulnerability<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">PolKit (previously known as PolicyKit) is a component that provides centralized way to define and handle policies and controls system-wide privileges in Unix-like OS. The vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-19788\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2018-19788<\/a> was caused due to improper validation of permission requests. It allows a non-privileged user with user id greater than the maximum integer to successfully execute arbitrary code under root context.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The vulnerability exists within PolKit\u2019s versions earlier than 0.115, which comes pre-installed by some of the most popular Linux distributions. A patch was released, but it required a manual install by the relevant package manager issuer.<br>You can check if your machine is vulnerable by running the command \u201cpkttyagent -version\u201d and verify that your PolKit\u2019s version is not vulnerable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-an-attacker-can-exploit-this-vulnerability-to-gain-access-to-your-environment\">How an attacker can exploit this vulnerability to gain access to your environment<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We are going to demonstrate a simple exploitation inspired from a previously published <a href=\"https:\/\/github.com\/mirchr\/security-research\/blob\/master\/vulnerabilities\/CVE-2018-19788.sh\" target=\"_blank\" rel=\"noreferrer noopener\">proof of concept (POC)<\/a>. The exploitation shows how an attacker could leverage this vulnerability for achieve privilege escalation technique and access restrict files. For this demonstration, we will use one of the most popular Linux distributions today.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">First, we verify that we are on vulnerable machine by checking the PolKit version. Then, we verify that the user ID is greater than the maximal integer value.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp\" alt=\"Code verification that a user ID is greater than the maximal integer value screenshot\" style=\"border-radius:0px\" title=\"Code verification that a user ID is greater than the maximal integer value screenshot\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Now, that we know we are on vulnerable machine, we can leverage this flaw by using another pre-installed tool, Systemctl, that uses PolKit as the permission policy enforcer and has the ability to execute arbitrary code. If you take closer look into <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-19788\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2018-19788<\/a>, you would find Systemctl is impacted by the vulnerability. Systemctl is one of Systemd utilities, and the system manager that is becoming the new foundation for building with Linux.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Using Systemctl, we will be able to create a new service in order to execute our malicious command with root context. Because of the flaw in PolKit, we can bypass the permission checks and runs systemctl operations. Let\u2019s take a look at how we can do that.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"bash-script-content\">Bash script content:<\/h3>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; auto-links: false; gutter: false; title: ; quick-code: false; notranslate\" title=\"\">\n#!\/bin\/bash\ncat <> \/tmp\/polKitVuln.service\n[Unit]\nDescription= Abusing PolKit Vulnerability\n[Service]\nExecStart=\/bin\/bash -c 'cat \/etc\/sudoers > \/tmp\/sudoersList.txt'\nRestart=on-failure\nRuntimeDirectoryMode=0755\n \n[Install]\nWantedBy=multi-user.target\nAlias= polKitVuln.service\nEOF\n \nsystemctl enable \/tmp\/polKitVuln.service\nsystemctl start polKitVuln.service\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">First, we define a new service and provides the required information to \u201c\/tmp\/polkitVuln.service\u201d. The ExecStart directive contains our command (bolded above), accesses the sudoers file, and copies its content to a share folder. This shared folder can be accessed by unprivileged users. The Sudoers file is one of the most important files in the system, as it contains the users and groups privileges information of the machine. At the last part of the script, we make the actual call for systemctl tool to create and start our new service.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"execute-the-script\">Execute the script:<\/h3>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/73b5e3e6-8146-4f13-a7b1-a49829704e46.webp\" alt=\"Screenshot of code showing errors regarding Polkit failing to handle uid field\" style=\"border-radius:0px\" title=\"Screenshot of code showing errors regarding Polkit failing to handle uid field\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Notice the errors regarding Polkit failing to handle the uid field. As the Sudoers file is copied using the exploitation, we can read its content.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/3de5e801-cfe3-4281-ac85-3af2c5f79b4f.webp\" alt=\"Screenshot of code proving Sudoers file is copied using the exploitation\" style=\"border-radius:0px\" title=\"Screenshot of code proving Sudoers file is copied using the exploitation\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">With this vulnerability attackers can bypass permissions to check and gain root access to your environment. In another blog post, \u201c<a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-detect-attacks-against-your-linux-machines\/\" target=\"_blank\" rel=\"noreferrer noopener\">How Azure Security Center helps detect attacks against your Linux machines<\/a>,\u201d we showed how attackers can exploit hosts for installing crypto miners or attack other resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"protect-against-and-respond-to-threats-with-azure-security-center\">Protect against and respond to threats with Azure Security Center<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Security Center can help detect threats, such as the PolKit vulnerability, and help you quickly mitigate these risks. Azure Security Center consolidates your security alerts into a single dashboard, making it easier for you to see the threats in your environment and prioritize your response to threats. Each alert gives you a detailed description of the incident as well as steps on how to remediate the issue.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While we investigate Azure Security Center hosts impact, we could determine what is the frequency in which machines are under attack and using behavioral detection techniques, inform customers when they have been attacked. Below is the security alert based on our previous activity which you can see in Security Center.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/dc29e0a5-e53d-4d39-9db8-4fbbaa68650d.webp\" alt=\"Screenshot of security alert in Azure Security Center\" style=\"border-radius:0px\" title=\"Screenshot of security alert in Azure Security Center\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, Azure Security Center provides a set of steps that enable customers to quickly remediate the problem:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">System administration should not allow negative user IDs or user IDs greater than 2147483646.\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Verify user ID maximum and minimum values under \u201c\/etc\/login.defs.\u201d<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Upgrade your policykit package by the package manager in advance.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"get-started-with-azure-security-center\">Get started with Azure Security Center<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Start using <a href=\"https:\/\/azure.microsoft.com\/en-us\/free\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Security Center\u2019s Standard Tier<\/a> for free today.<\/p>\n\n\n<h3>\u00a0<\/h3>\n<pre>\u00a0<\/pre>\n<p>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1466,1459],"tags":[],"audience":[3053,3056],"content-type":[1511],"product":[1798],"tech-community":[],"topic":[],"coauthors":[97],"class_list":["post-1749","post","type-post","status-publish","format-standard","hentry","category-hybrid-multicloud","category-security","audience-it-decision-makers","audience-it-implementors","content-type-best-practices","product-azure-security-center","review-flag-1680286581-295","review-flag-1680286581-56","review-flag-free-1680286579-836","review-flag-lever-1680286579-649","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure Security Center can detect emerging vulnerabilities in Linux | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure Security Center can detect emerging vulnerabilities in Linux | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-29T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-12T12:15:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp\" \/>\n<meta name=\"author\" content=\"Microsoft Azure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Azure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Azure\"}],\"headline\":\"Azure Security Center can detect emerging vulnerabilities in Linux\",\"datePublished\":\"2019-01-29T08:00:00+00:00\",\"dateModified\":\"2025-06-12T12:15:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\"},\"wordCount\":775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp\",\"articleSection\":[\"Hybrid + multicloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\",\"name\":\"Azure Security Center can detect emerging vulnerabilities in Linux | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp\",\"datePublished\":\"2019-01-29T08:00:00+00:00\",\"dateModified\":\"2025-06-12T12:15:46+00:00\",\"description\":\"Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid + multicloud\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Azure Security Center can detect emerging vulnerabilities in Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure Security Center can detect emerging vulnerabilities in Linux | Microsoft Azure Blog","description":"Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/","og_locale":"en_US","og_type":"article","og_title":"Azure Security Center can detect emerging vulnerabilities in Linux | Microsoft Azure Blog","og_description":"Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2019-01-29T08:00:00+00:00","article_modified_time":"2025-06-12T12:15:46+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp","type":"","width":"","height":""}],"author":"Microsoft Azure","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Microsoft Azure","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/","@type":"Person","@name":"Microsoft Azure"}],"headline":"Azure Security Center can detect emerging vulnerabilities in Linux","datePublished":"2019-01-29T08:00:00+00:00","dateModified":"2025-06-12T12:15:46+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/"},"wordCount":775,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp","articleSection":["Hybrid + multicloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/","name":"Azure Security Center can detect emerging vulnerabilities in Linux | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp","datePublished":"2019-01-29T08:00:00+00:00","dateModified":"2025-06-12T12:15:46+00:00","description":"Recently a new flaw was discovered in PolKit, a component which controls system-wide privileges in Unix-like OS. This vulnerability potentially allows unprivileged accounts to have root permission.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/01\/83126b24-2cc3-430d-8f26-95592e6561bc.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/azure-security-center-can-detect-emerging-vulnerabilities-in-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Hybrid + multicloud","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/"},{"@type":"ListItem","position":3,"name":"Azure Security Center can detect emerging vulnerabilities in Linux"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=1749"}],"version-history":[{"count":2,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1749\/revisions"}],"predecessor-version":[{"id":41602,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1749\/revisions\/41602"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=1749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=1749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=1749"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=1749"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=1749"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=1749"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=1749"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=1749"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=1749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}