Millions of User Passwords at Risk Due to Linux Vulnerabilities

Qualys has disclosed two vulnerabilities that could lead to the seizure of millions of passwords – and corporate

Millions of Linux users around the world are vulnerable to password theft due to two critical local information-disclosure vulnerabilities. The Qualys Threat Research Unit (TRU) unearthed the vulnerabilities, which target core dump handlers on major Linux distributions.

The two vulnerabilities exploit race conditions that allow hackers to gain access to resulting core dumps. From there, they can target the “unix_chkpwd” process, a standard password verification component that can be found on most Linux systems. If exploited, this opens up companies around the world to wide-reaching data breaches.

The organizational impacts could be devastating, with massive breaches often signaling the death knell for a lot of companies. The discovery underscores the vital importance good cybersecurity practices – and highlights that we’re currently fighting a losing battle.

Millions of Linux User Passwords At Risk

Linux users around the world should brace for password theft, according to new findings from Qualys. The company has unveiled two critical vulnerabilities in global Linux systems, which potentially open the door for attackers to extract sensitive password data through core dump manipulation.

The IT security specialists recently disclosed two vulnerabilities that target core dump handlers on major Linux distributors. These vulnerabilities can be exploited by hackers, resulting in core dumps being compromised.

 

About Tech.co Video Thumbnail Showing Lead Writer Conor Cawley Smiling Next to Tech.co LogoThis just in! View
the top business tech deals for 2025 👨‍💻
See the list button

With this access, attackers can target the unix_chkpwd process, which is used to extract password hashes on most Linux systems. This would expose millions of user passwords around the world, opening businesses that use Linux operating systems up to ransomware attacks – and the grave consequences that come with them.

Vulnerabilities Target Information-Rich Core Dumps

Essentially, a core dump is a file containing a snapshot of a process’ memory when that process crashes. It’s used by developers to better understand what caused the crash, and to mitigate against it happening again. However, because core dumps often store sensitive information, they’re also a tantalizing prospect for would-be cybercriminals.

Core dumps normally have security mechanisms in place to prevent hackers from accessing them. However, the Linux vulnerabilities in question circumvent these protocols, meaning vital user data, including passwords, encryption keys, and even customer data, are totally unprotected.

Affected systems include Ubuntu 24.04 and every Ubuntu release from 16.04 onwards. Similarly, Fedora 40/41 and Red Hat Enterprise Linux 9 and 10 could be subject to exposure. Debian systems are exempt from the threat, as they don’t have core dump handlers.

Findings Point to Wider Cybersecurity Failings

The impact of these vulnerabilities could be catastrophic for businesses around the world. If exploited, hackers could gain access to millions of users’ sensitive information. With this information at their fingertips, they can hold businesses to ransom for high sums. The impacts, however, extend far beyond the financial.

Often, companies that are subject to high-profile data breaches suffer significant reputational damage. Customers lose their faith in that institution as a custodian of their personal information and take their business elsewhere. The effects can be terminal.

With such severe consequences, you would assume that companies around the world are taking their cybersecurity seriously. Shockingly, recent research indicates that that is not necessarily the case, with most businesses deserting even their most basic duties.

If the business world is to get to grips with this escalating problem, firms need to invest more time and resources into upskilling their existing employees and exploring emerging defense technologies. While it’s still in its relative infancy, AI poses a potential solution to some of the problems that we’re currently experiencing.

Did you find this article helpful? Click on one of the following buttons
We're so happy you liked! Get more delivered to your inbox just like it.

We're sorry this article didn't help you today – we welcome feedback, so if there's any way you feel we could improve our content, please email us at contact@tech.co

Written by:
Gus is a Senior Writer at Tech.co. Since completing his studies, he has pursued a career in fintech and technology writing which has involved writing reports on subjects including web3 and inclusive design. His work has featured extensively on 11:FS, The Fold Creative, and Morocco Bound Review. Outside of Tech.co, he has an avid interest in US politics and culture.
Explore More See all news
Back to top
close Thinking about your online privacy? NordVPN is Tech.co's top-rated VPN service See Deals