A privilege escalation vulnerability could allow an attacker to take advantage of programming errors or design flaws and gain elevated access to the network and its associated data and applications. It is very easy for an attacker to escalate privileges from low-level to high-level privileges because most organizations lack adequate security measures and controls.
PE vulnerabilities could allow an attacker to gain unauthorized access to organizations’ IT network and carry out various malicious operations such as stealing sensitive data, disrupting operations, and creating backdoors for future attacks.
Types of Privilege Escalation
There are two types of privilege escalation: vertical and horizontal.
Vertical privilege escalation requires an attacker to gain elevated access from low-level to high-level privileges. In vertical privilege escalation, an attacker initially gains access to a lower level account and uses this privilege to gain higher level access. For instance, an attacker might compromise a user’s bank account and then leverages the user account credentials to gain elevated access to the administrator account.
Horizontal privilege escalation requires an attacker to use the same level of privileges which he gained previously without elevating his privileges. In horizontal privilege escalation, the attacker does not actively attempt to escalate the privileges associated with the compromised account.
How does a Privilege Escalation attack work?
Examples of Privilege Escalation Vulnerability Attack
Example 1 - Microsoft Exchange Vulnerability
Researchers observed that Microsoft Exchange 2013 and newer versions are vulnerable to a privilege escalation attack. They noted that Microsoft Exchange is vulnerable to a zero-day which could allow attackers with a mailbox to gain Domain Controller admin privileges using a simple Python tool.
Researchers noted that this zero-day is not a single issue but a combination of three security issues that could allow attackers to elevate access from a hacked email account to the admin account of the Domain Controller.
Example 2 - Dirty Sock Vulnerability in Ubuntu OS
On 25, January 2019, a security researcher for Shenanigans Labs, Chris Moberly, reported a vulnerability that impacted the Ubuntu operating system. The researcher named the vulnerability as ‘Dirty Sock’ and noted that this bug is a local privilege escalation vulnerability which could allow attackers to gain root level access to the system.
Moberly noted that the actual vulnerability does not exist in the Ubuntu OS itself, but in Snapd, which is included in all recent Ubuntu versions, and in some other Linux distros by default.
How to prevent privilege escalation attacks?
Publisher