{"id":104817,"date":"2026-03-16T12:54:22","date_gmt":"2026-03-16T08:54:22","guid":{"rendered":"https:\/\/techxmedia.com\/en\/?p=104817"},"modified":"2026-03-16T12:54:23","modified_gmt":"2026-03-16T08:54:23","slug":"crackarmor-flaws-bypass-apparmor-risk-linux-systems","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/crackarmor-flaws-bypass-apparmor-risk-linux-systems\/","title":{"rendered":"CrackArmor Flaws Bypass AppArmor, Risk Linux Systems"},"content":{"rendered":"\n<p>CrackArmor vulnerabilities discovered by the&nbsp;<a href=\"https:\/\/www.qualys.com\/\">Qualys<\/a>&nbsp;Threat Research Unit (TRU) have exposed more than 12 million enterprise systems running Linux distributions such as&nbsp;Ubuntu,&nbsp;Debian, and&nbsp;SUSE Linux&nbsp;since 2017.<\/p>\n\n\n\n<p>The researchers identified \u201cCrackArmor,\u201d a set of nine vulnerabilities within&nbsp;AppArmor, a widely used security module in the Linux kernel. The flaws allow local attackers to gain full root access. They can also execute container breakouts and trigger system-wide crashes.<\/p>\n\n\n\n<p>According to the findings, the CrackArmor vulnerabilities exploit a \u201cconfused deputy\u201d flaw. This type of weakness manipulates a trusted, higher-privilege program into misusing its authority. As a result, attackers can trick system processes into performing malicious actions on their behalf.<\/p>\n\n\n\n<p>Consequently, this approach enables threat actors to bypass existing security controls. It also allows them to gain unauthorized access or escalate privileges without requiring administrative credentials.<\/p>\n\n\n\n<p>The discovery highlights significant risks across multiple industries. Sectors most affected include <a href=\"https:\/\/techxmedia.com\/en\/?s=cloud\">cloud<\/a> computing, banking and finance, manufacturing, healthcare, and government operations.<\/p>\n\n\n\n<p>Commenting on the findings,&nbsp;Dilip Bachwani, chief technology officer at&nbsp;Qualys, said the vulnerabilities reveal weaknesses in commonly trusted security assumptions.<\/p>\n\n\n\n<p>\u201cThese discoveries highlight critical gaps in how we rely on default security assumptions,\u201d Bachwani said. \u201cCrackArmor proves that even the most entrenched protections can be bypassed without admin credentials. For CISOs, this means patching alone isn&#8217;t enough; we must re-examine our entire assumption of what \u2018default\u2019 configurations mean for our infrastructure.\u201d<\/p>\n\n\n\n<p>Meanwhile, researchers emphasized that the only reliable mitigation method is immediate kernel patching. Organizations are therefore urged to apply the necessary security updates to protect systems from potential exploitation.<\/p>\n\n\n\n<p>In line with responsible disclosure practices, the Qualys TRU team coordinated with upstream maintainers for several months. This collaboration ensured that fixes were robust and stable across multiple Linux distributions before the vulnerabilities were publicly disclosed.<\/p>\n\n\n\n<p>Qualys said it will continue working with the wider cybersecurity community to address these issues. Organizations are encouraged to deploy security updates promptly to mitigate risks associated with the CrackArmor vulnerabilities<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CrackArmor vulnerabilities discovered by the&nbsp;Qualys&nbsp;Threat Research Unit (TRU) have exposed [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":104821,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1595,9621],"tags":[1051],"contributor":[9732],"class_list":["post-104817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-emerging-technologies","tag-vendors","contributor-news-desk"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2026\/03\/Qualys_English-copy-16.jpg.jpeg","author_info":{"display_name":"Fahima safar","author_link":"https:\/\/techxmedia.com\/en\/author\/fahima\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/104817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=104817"}],"version-history":[{"count":1,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/104817\/revisions"}],"predecessor-version":[{"id":104818,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/104817\/revisions\/104818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/104821"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=104817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=104817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=104817"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=104817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}