Home » Emerging Technologies » Cyber Security » CrackArmor Flaws Bypass AppArmor, Risk Linux Systems
News Desk -

Share

CrackArmor vulnerabilities discovered by the Qualys Threat Research Unit (TRU) have exposed more than 12 million enterprise systems running Linux distributions such as Ubuntu, Debian, and SUSE Linux since 2017.

The researchers identified “CrackArmor,” a set of nine vulnerabilities within AppArmor, a widely used security module in the Linux kernel. The flaws allow local attackers to gain full root access. They can also execute container breakouts and trigger system-wide crashes.

According to the findings, the CrackArmor vulnerabilities exploit a “confused deputy” flaw. This type of weakness manipulates a trusted, higher-privilege program into misusing its authority. As a result, attackers can trick system processes into performing malicious actions on their behalf.

Consequently, this approach enables threat actors to bypass existing security controls. It also allows them to gain unauthorized access or escalate privileges without requiring administrative credentials.

The discovery highlights significant risks across multiple industries. Sectors most affected include cloud computing, banking and finance, manufacturing, healthcare, and government operations.

Commenting on the findings, Dilip Bachwani, chief technology officer at Qualys, said the vulnerabilities reveal weaknesses in commonly trusted security assumptions.

“These discoveries highlight critical gaps in how we rely on default security assumptions,” Bachwani said. “CrackArmor proves that even the most entrenched protections can be bypassed without admin credentials. For CISOs, this means patching alone isn’t enough; we must re-examine our entire assumption of what ‘default’ configurations mean for our infrastructure.”

Meanwhile, researchers emphasized that the only reliable mitigation method is immediate kernel patching. Organizations are therefore urged to apply the necessary security updates to protect systems from potential exploitation.

In line with responsible disclosure practices, the Qualys TRU team coordinated with upstream maintainers for several months. This collaboration ensured that fixes were robust and stable across multiple Linux distributions before the vulnerabilities were publicly disclosed.

Qualys said it will continue working with the wider cybersecurity community to address these issues. Organizations are encouraged to deploy security updates promptly to mitigate risks associated with the CrackArmor vulnerabilities