{"vulnerability": "CVE-2021-3493", "sightings": [{"uuid": "42b061d5-1ff6-41a7-9e52-38c93cde866a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "3431f67a-4aa7-44a2-a7c5-6266c1c3de61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971724", "content": "", "creation_timestamp": "2024-12-24T20:33:17.005387Z"}, {"uuid": "8b023ed5-c9d9-4b66-86b3-f984b0ed6a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "24b21c16-a59b-40e2-9ef6-15407fb15163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu5tqs2x", "content": "", "creation_timestamp": "2025-10-29T14:12:43.749424Z"}, {"uuid": "4e74f9de-413f-4bc1-9620-f9e830926021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwbsaigg3p2w", "content": "", "creation_timestamp": "2025-08-13T12:11:04.156492Z"}, {"uuid": "a0eed003-992a-4fb6-a80a-c950723e98ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:38.000000Z"}, {"uuid": "ee4b0267-9726-4abf-9899-3c1e0ae5cfb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:30.000000Z"}, {"uuid": "8097540b-7f86-4530-b3c0-68971e0da0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu65je2x", "content": "", "creation_timestamp": "2025-10-29T14:12:52.051339Z"}, {"uuid": "cab6a738-71a7-405c-b3d8-fce3889d31fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu66im2x", "content": "", "creation_timestamp": "2025-10-29T14:12:53.233566Z"}, {"uuid": "4f342df6-94ea-48ef-a632-dfdcac915076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu63kt2x", "content": "", "creation_timestamp": "2025-10-29T14:12:48.475187Z"}, {"uuid": "1d2dfa78-e003-4941-9f08-67633cf81b76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu5zmc2x", "content": "", "creation_timestamp": "2025-10-29T14:12:44.993283Z"}, {"uuid": "3f509623-39de-4e6d-b7fc-3c79aa8be3a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu62lk2x", "content": "", "creation_timestamp": "2025-10-29T14:12:46.157973Z"}, {"uuid": "d310d604-d5a2-4cda-aa2e-2e52c4bc6a83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu62ll2x", "content": "", "creation_timestamp": "2025-10-29T14:12:47.329335Z"}, {"uuid": "d9db0b02-a72a-4f92-8735-06c7217070c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu64k32x", "content": "", "creation_timestamp": "2025-10-29T14:12:49.670701Z"}, {"uuid": "5cb79f4e-5e4d-4ed6-832a-685898a90974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu64k42x", "content": "", "creation_timestamp": "2025-10-29T14:12:50.863189Z"}, {"uuid": "82206cf5-5140-42c3-a338-09040b3d2e28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:05.000000Z"}, {"uuid": "2d16b342-18b4-4ef3-92f8-157553283935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/cve_2021_3493_overlayfs.rb", "content": "", "creation_timestamp": "2021-12-02T17:01:28.000000Z"}, {"uuid": "52e4c5fc-1399-4c81-9b9a-25318bb5e204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m4evhjkaky2v", "content": "", "creation_timestamp": "2025-10-30T02:17:49.673042Z"}, {"uuid": "33d81d11-f6c0-4782-94db-710ec047913a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-3493", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/0dbe2ac7-4a47-4df9-be3a-2ac23a7b4c82", "content": "", "creation_timestamp": "2026-02-02T12:27:11.566977Z"}, {"uuid": "b879db4b-4cc7-4dfd-9646-ddf4a9ce98b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "published-proof-of-concept", "source": "Telegram/UHDH5Dy8dLbKDvrSUjbHqZq8jdYbFApOrWWgQ31t4VSl0Kk", "content": "", "creation_timestamp": "2026-04-20T15:00:07.000000Z"}, {"uuid": "ff260655-5266-46cd-91a4-ebbaf6bbb8bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://t.me/itsec_news/1398", "content": "\u200b\u26a1\ufe0f \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0448\u0442\u0430\u043c\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043b\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0438 IoT-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043d\u0430 Linux.\n\n\ud83d\udcac \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 AT&amp;T Alien Labs \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u043d\u043e\u0432\u043e\u0435 \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Shikitega. \u041e\u043d\u043e \u0437\u0430\u0440\u0430\u0436\u0430\u0435\u0442 \u043a\u0430\u043a \u0441\u0435\u0440\u0432\u0435\u0440\u044b, \u0442\u0430\u043a \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0432\u0435\u0449\u0435\u0439 \u043d\u0430 Linux., \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0443\u043f\u0435\u043d\u0447\u0430\u0442\u0443\u044e \u0441\u0445\u0435\u043c\u0443 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0438 \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u043f\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0441\u043e\u0442\u0435\u043d \u0431\u0430\u0439\u0442\u043e\u0432 \u0437\u0430 \u0448\u0430\u0433, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043a\u0440\u0438\u043f\u0442\u043e\u0440 Shikata Ga Nai. \n\n\u042d\u0442\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u043b\u0438\u043c\u043e\u0440\u0444\u0438\u0437\u043c, \u0437\u0430\u0449\u0438\u0449\u0430\u044f \u043a\u043e\u0434 \u043e\u0442 \u0441\u0442\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440. Shikitega \u0438\u0437\u043c\u0435\u043d\u044f\u0435\u0442 \u0441\u0432\u043e\u0439 \u043a\u043e\u0434 \u043a\u0430\u0436\u0434\u044b\u0439 \u0440\u0430\u0437, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 \u043e\u0434\u0438\u043d \u0438\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0446\u0438\u043a\u043b\u043e\u0432 \u0434\u0435\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u0442\u0441\u044f Mettle \u043a\u0430\u043a \u043e\u0431\u043b\u0435\u0433\u0447\u0435\u043d\u043d\u044b\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 Meterpreter, \u0441 \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0435\u0439 CVE-2021-4034 \u0438 CVE-2021-3493. \u0418\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b \u0432\u0438\u0440\u0443\u0441\u0430 \u0432\u0435\u0441\u0438\u0442 376 \u0431\u0430\u0439\u0442.\n\n\u0426\u0435\u043b\u044c Shikitega \u2014 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u0430, \u043d\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0438 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438. \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u0441\u0431\u0440\u0430\u0441\u044b\u0432\u0430\u0435\u0442 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 XMRig \u0434\u043b\u044f \u0434\u043e\u0431\u044b\u0447\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b Monero. \u041f\u0430\u043a\u0435\u0442 Mettle \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0432\u0435\u0431-\u043a\u0430\u043c\u0435\u0440\u043e\u0439, \u043a\u0440\u0430\u0441\u0442\u044c \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0431\u043e\u043b\u044c\u0448\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432. \n\nAT&amp;T \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u043a\u0430\u043a \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0435 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0435, \u043d\u043e \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e Shikitega \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Linux, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0432 2021 \u0433\u043e\u0434\u0443.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0433\u043e \u0445\u043e\u0441\u0442\u0438\u043d\u0433\u0430 \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0447\u0430\u0441\u0442\u0438 \u0441\u0432\u043e\u0435\u0439 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438, \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u044f\u0441\u044c \u043f\u043e IP-\u0430\u0434\u0440\u0435\u0441\u0443 \u0432\u043c\u0435\u0441\u0442\u043e \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u043c\u0435\u043d\u0438. \n\n\u0412 \u043c\u0430\u0440\u0442\u0435 2021 \u0433\u043e\u0434\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 GRIMM \u0410\u0434\u0430\u043c \u041d\u0438\u043a\u043e\u043b\u0441 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-27365 (\u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438, \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439) \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 iSCSI \u044f\u0434\u0440\u0430 Linux. \u0411\u0430\u0433 \u0432 \u043a\u043e\u0434\u0435 \u0431\u044b\u043b \u0441 2006 \u0433\u043e\u0434\u0430. \u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u043c\u0438 \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0432\u0441\u0435 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux.\n\n#Linux #\u041f\u041e #\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441 #\u0425\u0430\u043a\u0435\u0440\u044b\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2022-09-11T09:19:15.000000Z"}, {"uuid": "61e0e91b-57ad-43d7-9317-b3c96b78831f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "exploited", "source": "Telegram/4QOnyeYC_lTC0SMJQhtMgvSiM85xnm7m1QqUSxY6BArIyUs", "content": "", "creation_timestamp": "2025-12-23T21:00:05.000000Z"}, {"uuid": "5e423de0-55c0-419b-9c24-a235accd27ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "published-proof-of-concept", "source": "Telegram/zZq4LjCv3lg7SAnTEL8ri9PTbsoMxz2uCoiE6kbrXJdK8WQ", "content": "", "creation_timestamp": "2025-10-22T15:00:07.000000Z"}, {"uuid": "af691bf6-228a-4023-b08d-6c6aacc3ee88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://t.me/ctinow/70493", "content": "CISA adds Linux kernel flaw CVE-2021-3493 to its\u00a0Known Exploited Vulnerabilities Catalog\n\nhttps://ift.tt/WqejPgs", "creation_timestamp": "2022-10-21T16:01:30.000000Z"}, {"uuid": "a3567807-732e-4e93-9e1c-01b0da673b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://t.me/proxy_bar/953", "content": "Shikitega\n\u041d\u043e\u0432\u0430\u044f \u043c\u0430\u043b\u0432\u0430\u0440\u044c \u043f\u043e\u0434 Linux (\u0445\u043e\u0442\u044f \u044e\u0437\u0430\u0435\u0442 \u0441\u043f\u043b\u043e\u0438\u0442\u044b \u043d\u0435 \u043d\u043e\u0432\u044b\u0435: \u0437\u0430\u0431\u0440\u0430\u0442\u044c \u0442\u0443\u0442 CVE-2021-4034 \u0438  CVE-2021-3493)\n*\n\u0410 \u0446\u0435\u043b\u043e\u043c \u043d\u0438\u0447\u0435\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0433\u043e, \u043f\u0440\u043e\u0441\u0442\u043e \u0432\u0431\u0438\u0432 \u043f\u043e \u043a\u0440\u043e\u043d\u0443 \u043c\u0430\u0439\u043d\u0435\u0440 XMR (\u043d\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u043d\u0435  \u0432\u0441\u0435 \u043f\u0440\u0438\u043b\u0435\u0442\u0435\u043b\u043e \u0441 C&amp;C srv )\n\u0412 \u043e\u0431\u0449\u0435\u043c \u0432\u043e\u0442 \u0445\u043e\u0440\u043e\u0448\u0438\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0434\u043b\u044f \"\u043c\u044b\u043b\u043e\u0432\u0430\u0440\u043e\u0432\", \u043d\u043e \u0432 \u0446\u0435\u043b\u043e\u043c \u0435\u0441\u043b\u0438  \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u043a\u0430\u043a\u0438\u0435 CVE \u044e\u0437\u0430\u0435\u0442 \u0438 \u043a\u0430\u043a\u0438\u0435 payload \u0437\u0430\u043a\u0438\u0434\u044b\u0432\u0430\u0435\u0442 \u0434\u0440\u043e\u043f\u043f\u0435\u0440 - \u044f\u0441\u043d\u043e \u0447\u0442\u043e \u043b\u044e\u0434\u0438 \u0432 patch \u043d\u0435 \u0443\u043c\u0435\u044e\u0442\\\u043d\u0435\u0445\u043e\u0442\u044f\u0442 \u043d\u043e \u0431\u0435\u043b\u044b\u0439 IP \u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0438\u043c\u0435\u044e\u0442.\n*\n\u0418\u041d\u0442\u0435\u0440\u0435\u0441\u043d\u0430 \u0441\u043a\u043e\u0440\u0435\u0435 \u0442\u0435\u0445\u043d\u0438\u043a\u0430 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 - \u0432  \u043e\u0431\u0449\u0435\u043c \u0432\u043e\u0442 \u0447\u0438\u0442\u0430\u0435\u043c\n\n#malware #linux #exploit #miner", "creation_timestamp": "2022-09-06T19:10:01.000000Z"}, {"uuid": "90c96364-6c1e-42a6-abd7-2e36189d1163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "Telegram/bkc_E1FiPh4eWXWWBWeflp5sZlvjX2Owmh3nzI4Ue140NlM6", "content": "", "creation_timestamp": "2025-02-19T22:21:30.000000Z"}, {"uuid": "c75e7bdd-6b70-447d-bd2c-ba0640af80eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://t.me/arpsyndicate/1178", "content": "#ExploitObserverAlert\n\nCVE-2021-3493\n\nDESCRIPTION: Exploit Observer has 83 entries related to CVE-2021-3493. The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.\n\nFIRST-EPSS: 0.005820000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-04T10:19:48.000000Z"}, {"uuid": "7da490cb-19da-4b23-b579-a0fa64a523c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "published-proof-of-concept", "source": "https://t.me/pwnwiki_zhchannel/222", "content": "CVE-2021-3493 linux kernel \u7279\u6b0a\u63d0\u5347\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2021-3493_linux_kernel_%E7%89%B9%E6%AC%8A%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-04-21T10:26:15.000000Z"}, {"uuid": "1faf3e32-bbce-4ea1-9679-9fd986c57212", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34933", "type": "seen", "source": "https://t.me/cibsecurity/35483", "content": "\u203c CVE-2021-34933 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14911.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-14T00:30:42.000000Z"}, {"uuid": "516dc8e5-6ee3-4aa6-8535-346e43af56fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34934", "type": "seen", "source": "https://t.me/cibsecurity/35478", "content": "\u203c CVE-2021-34934 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14912.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-14T00:24:23.000000Z"}, {"uuid": "cd0b497b-fd66-49a4-8b08-ae4acd4d29e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34935", "type": "seen", "source": "https://t.me/cibsecurity/35468", "content": "\u203c CVE-2021-34935 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14913.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-14T00:24:08.000000Z"}, {"uuid": "5274271e-f76b-48c2-8e1a-6fd72e93f22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34937", "type": "seen", "source": "https://t.me/cibsecurity/35452", "content": "\u203c CVE-2021-34937 \u203c\n\nThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14915.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-14T00:18:51.000000Z"}, {"uuid": "473e0790-8c15-4642-8072-47be807d80bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "exploited", "source": "Telegram/dgIX9-JNHvQPffFxnFjGM89P7cQGo13PHRh9h44qokhu7exZ", "content": "", "creation_timestamp": "2022-09-13T08:47:38.000000Z"}, {"uuid": "d66f4999-147b-4c8d-b6b6-73e50fa277bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3510", "content": "#Whitepaper\n\"Ubuntu OverlayFS Local Privilege Escalation (CVE-2021-3493)\", 2021.\n\n// The document in this archive illustrates using the included proof of concept exploit to achieve root on Ubuntu systems using a flaw in the OverlayFS file system", "creation_timestamp": "2021-06-01T11:03:12.000000Z"}, {"uuid": "3e11a4cc-e6f5-404d-8a08-2978963e9492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3164", "content": "#exploit\nCVE-2021-3493:\nA vulnerability in OverlayFS allows local users under Ubuntu 14.04 ESM, 16.04/18.04/20.04 LTS, 20.10 to gain root privileges (PoC)\nhttps://ssd-disclosure.com/ssd-advisory-overlayfs-pe\n]-&gt; https://github.com/Ishan3011/CVE-2021-3493", "creation_timestamp": "2021-05-08T12:54:09.000000Z"}, {"uuid": "931762f4-59fc-4bed-a024-a25f26a0effe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3493", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3219", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 19-25)\nCVE-2021-3156 Heap-Based Buffer Overflow in Sudo\nhttps://t.me/cybersecuritytechnologies/2577\nCVE-2021-1732 Win kernel 0-day\nhttps://t.me/cybersecuritytechnologies/2679\nCVE-2021-22893 Pulse SecureVPN RCE\nhttps://t.me/cybersecuritytechnologies/3185\nCVE-2021-22204 Improper neutralization of user data in DjVu\nhttps://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800\nCVE-2021-26415 Win Installer EoP\nhttps://t.me/cybersecuritytechnologies/3186\nCVE-2021-3493 OverlayFS PE\nhttps://t.me/cybersecuritytechnologies/3164\nCVE-2021-26413 Win Installer Spoofing\nhttps://t.me/cybersecuritytechnologies/3176\nCVE-2016-7836 SKYSEA Client View Arbitrary Code Exec\nhttps://www.virusbulletin.com/virusbulletin/2020/05/vb2019-paper-apt-cases-exploiting-vulnerabilities-regionspecific-software\nCVE-2021-27905 Apache Solr SSRF\nhttps://t.me/cybersecuritytechnologies/3213", "creation_timestamp": "2021-04-26T11:02:21.000000Z"}]}