Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community
DynoRoot (CVE-2018-1111) exposed via Advanced Hunting
Published Jun 09 2018 07:56 AM 1,924 Views

What is DynoRoot?

DynoRoot (CVE-2018-1111) is a remote command injection present in a script included by the DHCP client in Red Hat Enterprise Linux 6 and 7.

It allows a malicious attacker to run arbitrary commands on the attacked machine, in the highest privileges.


How does it work?

In the affected systems, the DHCP client has a script under "/etc/NetworkManager/dispatcher.d/". That script is executed each time NetworkManager receives a DHCP response from a DHCP server.

Unfortunately, the script has a command injection, as it evaluates DHCP options sent from a rouge server:



Have I been breached?

In collaboration with our sensor partners, the Windows Defender Advanced Threat Protection team is monitoring your Linux machines. We have released an  Advanced Hunting query that you can run to see the processes spawned from DHCP clients, and act appropriately.


I'd like to watch a demo!

Our partners at Ziften and us composed a video showing the attack, as well as the advanced hunting query that shows how to hunt for DynoRoot exploitation.

Version history
Last update:
‎Nov 14 2019 02:41 PM
Updated by: