heroui logo

Potential Privilege Escalation via Container Misconfiguration

Elastic Detection Rules

View Source
Summary
The rule titled "Potential Privilege Escalation via Container Misconfiguration" aims to monitor for suspicious execution of processes interacting with Linux containers through an interactive shell without root permissions. Specifically, it targets the invocation of the command-line utilities runc and ctr, which are crucial for managing containers but can become vectors for privilege escalation when misconfigured. The rule's logic identifies processes initiated under the criteria that filter out root user activities, particularly those that set off with exec actions for these utilities in an interactive context. By detecting instances where non-root users attempt to leverage these utilities with specific flags, this rule aims to flag potential privilege escalation attempts that could empower attackers to access sensitive host resources or escalate privileges inadvertently. The detection setup requires data from the Elastic Defend integration and involves configuring appropriate policy settings to monitor relevant container actions effectively. Furthermore, the rule includes a structured process for investigation and remediation, pointing to the necessity of robust access controls to maintain security in containerized environments.
Categories
  • Endpoint
  • Containers
Data Sources
  • Process
  • Container
  • File
ATT&CK Techniques
  • T1611
Created: 2023-07-31