
Summary
This rule detects the invocation of the Linux DebugFS utility within a privileged container, which poses a significant risk because it allows direct file system manipulation and access to sensitive host-level files. DebugFS can be exploited for privilege escalation and potential escape from the container environment to the host system. The detection is triggered when a process related to DebugFS is started within a Linux container, especially when the command line arguments indicate access to system devices (e.g., /dev/sd*). The rule aids in identifying potential misuse of DebugFS and encourages a detailed investigation into the security context and configuration of the environment to mitigate risks associated with container misconfigurations.
Categories
- Containers
- Linux
- Endpoint
- Cloud
Data Sources
- Container
- Process
- Network Traffic
ATT&CK Techniques
- T1611
Created: 2025-03-12