Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits

The research team at ARMO has demonstrated that popular security solutions, including CrowdStrike’s Falcon, Microsoft Defender, Falco, and Tetragon, are effectively “blind” to malicious activities performed via io_uring—an asynchronous I/O mechanism introduced in Linux 5.1 that allows applications to bypass traditional system calls. The researchers emphasize that security vendors must adapt their detection strategies beyond simple syscall monitoring to ensure comprehensive protection against increasingly sophisticated attack techniques. This discovery highlights the challenges security vendors face in keeping pace with evolving attack techniques and underscores the importance of comprehensive monitoring approaches that can adapt to new kernel features and bypass methods. This vulnerability affects nearly all commercial Linux runtime security tools that rely on system call monitoring for threat detection. A critical vulnerability exists in Linux’s security framework, revealing that many runtime security tools struggle to detect threats operating via the io_uring interface. These include detecting anomalous usage of io_uring, implementing KRSI (Kernel Runtime Security Instrumentation), and finding alternative hook points across the Linux stack. Despite io_uring being available for years and previously identified as potentially problematic, security vendors have largely failed to address this gap in their monitoring capabilities. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. “KRSI offers native integration with the Linux security layer, enabling deep visibility into kernel-level events. “We decided to create Curing and release it publicly… to raise awareness about io_uring as an overlooked mechanism that attackers can exploit,” ARMO researchers stated in their report. CrowdStrike’s Falcon agent failed to detect sensitive file access operations performed through io_uring, effectively bypassing all file system visibility. This proof-of-concept malware can establish command and control communications, access sensitive files, and execute malicious commands while remaining undetected by standard security solutions. To prove the significance of this vulnerability, ARMO developed “Curing,” a fully functional rootkit that operates exclusively through io_uring operations. The report outlines several approaches that security vendors can implement to address this vulnerability. Open-source projects had varied responses—Falco maintainers acknowledged the issue and are working on a plugin for deeper visibility, while Tetragon developers pointed out that their tool can detect io_uring operations, but only if specifically configured to do so.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 24 Apr 2025 14:45:11 +0000


Cyber News related to Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits

CVE-2025-21630 - In the Linux kernel, the following vulnerability has been resolved: io_uring/net: always initialize kmsg->msg.msg_inq upfront syzbot reports that ->msg_inq may get used uinitialized from the following path: BUG: KMSAN: uninit-value in ...
6 months ago Tenable.com Silence
CVE-2022-48937 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2025-38453 - In the Linux kernel, the following vulnerability has been resolved: ...
2 days ago
CVE-2023-52903 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits - The research team at ARMO has demonstrated that popular security solutions, including CrowdStrike’s Falcon, Microsoft Defender, Falco, and Tetragon, are effectively “blind” to malicious activities performed via io_uring—an ...
3 months ago Cybersecuritynews.com
CVE-2024-39508 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-53187 - In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: ...
7 months ago Tenable.com
Linux 'io_uring' security blindspot allows stealthy rootkit attacks - The flaw was discovered by ARMO security researchers who developed a proof-of-concept rootkit called "Curing" to demonstrate the practicality and feasibility of attacks leveraging io_uring for evasion. The researchers explain that io_uring supports a ...
3 months ago Bleepingcomputer.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
4 weeks ago Cybersecuritynews.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
RingReaper - New Linux EDR Evasion Tool Using io_uring Kernel Feature - This advanced red team tool demonstrates how attackers can exploit high-performance asynchronous I/O operations to conduct stealthy operations while remaining undetected by traditional security monitoring mechanisms. A sophisticated new Linux evasion ...
2 weeks ago Cybersecuritynews.com
CVE-2021-47124 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
CVE-2021-47292 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-56762 - In the Linux kernel, the following vulnerability has been resolved: io_uring/sqpoll: fix sqpoll error handling races BUG: KASAN: slab-use-after-free in __lock_acquire+0x370b/0x4a10 kernel/locking/lockdep.c:5089 Call Trace: ... ...
6 months ago Tenable.com
CVE-2025-38196 - In the Linux kernel, the following vulnerability has been resolved: ...
3 weeks ago
CVE-2024-42254 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses - After infection, Remcos can capture user credentials by logging keystrokes and stealing stored passwords, modify and delete files to sabotage systems or encrypt data for ransom, establish persistence through scheduled tasks and registry modifications ...
4 months ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
CVE-2021-47569 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
New Linux Kernel Rust Module Unveiled to Detect Rootkits - The module represents a significant advancement in Linux security tooling, addressing the critical need for modern detection mechanisms against increasingly sophisticated kernel-level threats. The new detection module was developed as part of a ...
4 months ago Cybersecuritynews.com
CISOs See Software Supply Chain Security As Bigger Blind Spot Than GenAI: Cycode - PRESS RELEASE. SAN FRANCISCO, Dec. 06, 2023 - Cycode, the leader in Application Security Posture Management, today announced the inaugural State of ASPM 2024 report, the industry's first. The research found that AppSec chaos reigns, with 78% of CISOs ...
1 year ago Darkreading.com
Server-Side Request Forgery Attack Explained: Definition, Types, Protection - A Server-Side Request Forgery attack is a security vulnerability in which a hacker tricks a server into accessing unintended resources on his behalf. An SSRF attack can lead to sensitive information being leaked or the attacker gaining control of ...
2 years ago Heimdalsecurity.com
CVE-2023-52654 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-53052 - In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write When io_uring starts a write, it'll call kiocb_start_write() to bump the super block rwsem, preventing any freezes from ...
8 months ago Tenable.com

Latest Cyber News


Cyber Trends (last 7 days)