Home
%3CLINGO-SUB%20id%3D%22lingo-sub-207198%22%20slang%3D%22en-US%22%3ERE%3A%20DynoRoot%20(CVE-2018-1111)%20exposed%20via%20Advanced%20Hunting%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-207198%22%20slang%3D%22en-US%22%3ELikewise%2C%20you%20guys%20are%20great!%20Always%20happy%20for%20more%20collaborations!%20%3A)%3C%2Fimg%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-206843%22%20slang%3D%22en-US%22%3ERe%3A%20DynoRoot%20(CVE-2018-1111)%20exposed%20via%20Advanced%20Hunting%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-206843%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20AH%20interface%20is%20pretty%20awesome!%26nbsp%3B%20Loved%20working%20with%20you%20guys!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-202568%22%20slang%3D%22en-US%22%3EDynoRoot%20(CVE-2018-1111)%20exposed%20via%20Advanced%20Hunting%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-202568%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EWhat%20is%20DynoRoot%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EDynoRoot%20(%3CA%20href%3D%22https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2018-1111%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECVE-2018-1111%3C%2FA%3E)%20is%20a%20remote%20command%20injection%20present%20in%20a%20script%20included%20by%20the%20DHCP%20client%20in%20Red%20Hat%20Enterprise%20Linux%206%20and%207.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIt%20allows%20a%20malicious%20attacker%20to%20run%20arbitrary%20commands%20on%20the%20attacked%20machine%2C%20in%20the%20highest%20privileges.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHow%20does%20it%20work%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%20the%20affected%20systems%2C%20the%20DHCP%20client%20has%20a%20script%20under%20%22%2Fetc%2FNetworkManager%2Fdispatcher.d%2F%22.%20That%20script%26nbsp%3Bis%20executed%20each%20time%20NetworkManager%20receives%20a%20DHCP%20response%20from%20a%20DHCP%20server.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EUnfortunately%2C%20the%20script%20has%20a%20command%20injection%2C%20as%20it%20evaluates%20DHCP%20options%20sent%20from%26nbsp%3Ba%20rouge%20server%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20597px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F35699i7815F6FF0FC3EC8C%2Fimage-dimensions%2F597x176%3Fv%3D1.0%22%20width%3D%22597%22%20height%3D%22176%22%20alt%3D%22cmdinjection.png%22%20title%3D%22cmdinjection.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EHave%20I%20been%20breached%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIn%20collaboration%20with%20our%20sensor%20partners%2C%20the%20Windows%20Defender%20Advanced%20Threat%20Protection%20team%20is%20monitoring%20your%20Linux%20machines.%20We%20have%20released%20an%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FMicrosoft%2FWindowsDefenderATP-Hunting-Queries%2Fblob%2Fmaster%2FExploits%2FLinux-DynoRoot-CVE-2018-1111.txt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAdvanced%20Hunting%20query%3C%2FA%3E%20that%20you%20can%20run%20to%20see%20the%20processes%20spawned%20from%20DHCP%20clients%2C%20and%20act%20appropriately.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EI'd%20like%20to%20watch%20a%20demo!%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EOur%20partners%20at%20%3CA%20href%3D%22https%3A%2F%2Fziften.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EZiften%3C%2FA%3E%20and%20us%20composed%20a%20video%20showing%20the%20attack%2C%20as%20well%20as%20the%20advanced%20hunting%20query%26nbsp%3Bthat%20shows%20how%20to%20hunt%20for%20DynoRoot%20exploitation.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Furl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253Da9AAFJXh-VY%26amp%3Bsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252Fa9AAFJXh-VY%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bkey%3Dfad07bfa4bd747d3bdea27e17b533c0e%26amp%3Bschema%3Dyoutube%22%20width%3D%22400%22%20height%3D%22225%22%20scrolling%3D%22no%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%20title%3D%22Video%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-202568%22%20slang%3D%22en-US%22%3E%3CP%3EAdvanced%20hunting%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-202568%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdvanced%20hunting%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

What is DynoRoot?

DynoRoot (CVE-2018-1111) is a remote command injection present in a script included by the DHCP client in Red Hat Enterprise Linux 6 and 7.

It allows a malicious attacker to run arbitrary commands on the attacked machine, in the highest privileges.

 

How does it work?

In the affected systems, the DHCP client has a script under "/etc/NetworkManager/dispatcher.d/". That script is executed each time NetworkManager receives a DHCP response from a DHCP server.

Unfortunately, the script has a command injection, as it evaluates DHCP options sent from a rouge server:

cmdinjection.png

 

Have I been breached?

In collaboration with our sensor partners, the Windows Defender Advanced Threat Protection team is monitoring your Linux machines. We have released an  Advanced Hunting query that you can run to see the processes spawned from DHCP clients, and act appropriately.

 

I'd like to watch a demo!

Our partners at Ziften and us composed a video showing the attack, as well as the advanced hunting query that shows how to hunt for DynoRoot exploitation.

2 Comments
Occasional Visitor

The AH interface is pretty awesome!  Loved working with you guys!

Likewise, you guys are great! Always happy for more collaborations! :)