Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Gaming
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Linux Polkit Vulnerability Enables Root Access on Most Distros, XIot Devices.
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Cyber > Linux Polkit Vulnerability Enables Root Access on Most Distros, XIot Devices.
Cyber

Linux Polkit Vulnerability Enables Root Access on Most Distros, XIot Devices.

Editorial Desk
Last updated: January 28, 2022 3:35 pm
Editorial Desk
Share
SHARE

A trivially exploitable vulnerability has been disclosed in Polkit, a component installed by default on many Linux distributions. Successful exploits of this vulnerability would grant an attacker full root privileges on the host. Most devices in the Extended Internet of Things (XIoT) are likely affected.

Here’s what you need to know:

What is PwnKit?

The vulnerability, which Qualys has named PwnKit (CVE-2021-4034) has been in Polkit—once known as PolicyKit—for more than a decade. Polkit manages system-wide privileges on Linux operating systems and oversees how non-privileged processes communicate with privileged ones.

This memory-corruption issue likely impacts most devices in the XIoT, including industrial OT, enterprise IoT, and medical IoT equipment. PwnKit is a local privilege escalation vulnerability, meaning that an attacker would already need to have access to a vulnerable host in order to exploit the vulnerability.

Patches, Mitigations Available

Users who manage any Linux devices should determine their exposure and patch immediately. Qualys said it sent patches to affected distributions on Jan. 11; If a patch is not yet available for a particular Linux distribution, Qualys suggests as a mitigation that users remove the SUID-bit from Polkit’s pkexec function.

Which Distributions are Affected?

In its advisory, Qualys said it was able to trigger the vulnerability in Polkit’s pkexec function and gain root access on default installations of Ubuntu, Debian, Fedora, and CentOS. It’s likely that other distributions are vulnerable, and exploitable.

Have There Been Public Attacks?

Qualys said it is unaware of public exploits. Qualys did not publish its proof-of-concept exploit because of the ease of exploitation involved with attacking this vulnerability. Others, however, have already reverse-engineered the bug and published PoCs online, indicating that more malicious exploits may not be far behind.

Evidence of Exploitation

Users can find artifacts of exploits in logs, but Qualys cautions that the vulnerability may be quietly exploited as well.

“This exploitation technique leaves traces in the logs (either “The value for the SHELL variable was not found in the /etc/shells file” or “The value for environment variable […] contains suspicious content”),” Qualys said in its advisory. “However, please note that this vulnerability is also exploitable without leaving any traces in the logs.”

Beating the Drum on SBOMs

The disclosure of PwnKit is going to further inflame discussions about the security of open source software. Recently, the White House gathered tech leaders to discuss the issue in the context of the Log4j vulnerability in Apache. Log4j is a logging framework native to Apache that was ubiquitous across IT and operational technology environments. Multiple vulnerabilities and exploits surfaced post-disclosure, and the Biden administration expressed concern over the use of open source components in software used in critical infrastructure.

The issue when vulnerabilities such as PwnKit and Log4j arise is that users may be blind to these components running inside commercial or homegrown applications, so they may not understand their exposure when critical vulnerabilities are disclosed.

The Biden administration, last year in an Executive Order signed in May of last year, mandated that the federal government take steps to beef up the security of the software supply chain. The EO was in reaction to the SolarWinds compromise of late 2020, which demonstrated the fragility of the supply chain and reinforced the need for secure software development practices and oversight of products used by the federal government and within critical infrastructure.

One critical component of the EO was the need for a software bill of materials (SBOM) to be made available for each product used by the federal government. SBOMs describe the software components used in the development of a commercial product.

The availability of such a list would remove the mystery as to whether components such as Polkit, Log4j and others are running under the covers. Asset owners and IT administrators responsible for vulnerability management would immediately understand their exposure and be able to prioritise patching and other mitigations.

ByEditorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article Christopher Clark Delta Drone Delta Drone International To Divest Parazero For A$6 Million In Cash
Next Article PayID Fraud Payments Apple plans to turn iPhones into payment terminals
Leave a Comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Linux Polkit

Tech Articles

Australia's Heavy Vehicle EV Charging Market

Australia’s Heavy Vehicle EV Charging Market: A Critical Infrastructure Gap Being Filled

Australia’s heavy EV market is accelerating, but charging is the…

February 15, 2026
The Growing Crisis of Space junk and Debris

Space Junk Is Becoming One of the Biggest Threats to Modern Spaceflight

More than 33,000 tracked objects now orbit Earth at speeds…

May 8, 2026

How the World’s Data Centres Are Quietly Burning the Planet

Data centres are burning the planet, with a growing environmental…

March 11, 2026

Recent News

Zimperium Android spyware RatMilad
Cyber

Zimperium Publishes Details Of Newly Discovered Android Spyware Family Dubbed RatMilad.

2 Min Read
Optus scammers avoids jail
Cyber

Optus Data Breach Scammer Avoids Jail Sentance

1 Min Read
How Cyber Attacks Can Devastate Your Business in Australia - Tech News
Cyber

How Cyber Attacks Can Devastate Your Business: The Australian Reality

24 Min Read
Mobile Security Protection Public Necessity Akhil Bhutani, - tech news
Cyber

Why Mobile Security Protection Is Now A Public Necessity

6 Min Read
Tech News

Tech Business News

In 2026, technology news is shaping business outcomes faster than ever—driven by AI adoption, rising cyber risk, cloud modernisation, data regulation, and constant platform change.


Tech News keeps Australian organisations and industry professionals informed with timely reporting and practical coverage across AI, cybersecurity, cloud, enterprise IT, startups, science, people and business, plus major world and local news impacting the tech sector.


Tech Business News publishes news and analysis designed to be clear, relevant, and easy to act on. It supports the industry with technology news reports, whitepaper publishing services, and a range of media, advertising and publishing options 

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

May, 12, 2026

Contact

Tech Business News
Melbourne, Australia
Werribee 3030
Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.

Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2026

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?