heroui logo

Potential Sudo Privilege Escalation via CVE-2019-14287

Elastic Detection Rules

View Source
Summary
This detection rule monitors for the execution of a suspicious sudo command that exploits CVE-2019-14287, a vulnerability that allows privilege escalation to the root user due to improper validation of user IDs by sudo. Specifically, the command "sudo -u#-1" effectively executes commands as root by bypassing the intended user ID controls. This rule is designed for environments that utilize Elastic Defend and requires data from various endpoints like auditd, CrowdStrike, and SentinelOne. Upon detection, security teams are alerted to potential privilege escalation attempts, allowing for timely investigation and response to secure the compromised systems.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1068
Created: 2023-08-30