Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits

The research team at ARMO has demonstrated that popular security solutions, including CrowdStrike’s Falcon, Microsoft Defender, Falco, and Tetragon, are effectively “blind” to malicious activities performed via io_uring—an asynchronous I/O mechanism introduced in Linux 5.1 that allows applications to bypass traditional system calls. The researchers emphasize that security vendors must adapt their detection strategies beyond simple syscall monitoring to ensure comprehensive protection against increasingly sophisticated attack techniques. This discovery highlights the challenges security vendors face in keeping pace with evolving attack techniques and underscores the importance of comprehensive monitoring approaches that can adapt to new kernel features and bypass methods. This vulnerability affects nearly all commercial Linux runtime security tools that rely on system call monitoring for threat detection. A critical vulnerability exists in Linux’s security framework, revealing that many runtime security tools struggle to detect threats operating via the io_uring interface. These include detecting anomalous usage of io_uring, implementing KRSI (Kernel Runtime Security Instrumentation), and finding alternative hook points across the Linux stack. Despite io_uring being available for years and previously identified as potentially problematic, security vendors have largely failed to address this gap in their monitoring capabilities. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. “KRSI offers native integration with the Linux security layer, enabling deep visibility into kernel-level events. “We decided to create Curing and release it publicly… to raise awareness about io_uring as an overlooked mechanism that attackers can exploit,” ARMO researchers stated in their report. CrowdStrike’s Falcon agent failed to detect sensitive file access operations performed through io_uring, effectively bypassing all file system visibility. This proof-of-concept malware can establish command and control communications, access sensitive files, and execute malicious commands while remaining undetected by standard security solutions. To prove the significance of this vulnerability, ARMO developed “Curing,” a fully functional rootkit that operates exclusively through io_uring operations. The report outlines several approaches that security vendors can implement to address this vulnerability. Open-source projects had varied responses—Falco maintainers acknowledged the issue and are working on a plugin for deeper visibility, while Tetragon developers pointed out that their tool can detect io_uring operations, but only if specifically configured to do so.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 24 Apr 2025 14:45:11 +0000


Cyber News related to Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits

CVE-2025-21630 - In the Linux kernel, the following vulnerability has been resolved: io_uring/net: always initialize kmsg->msg.msg_inq upfront syzbot reports that ->msg_inq may get used uinitialized from the following path: BUG: KMSAN: uninit-value in ...
3 months ago Tenable.com Silence
CVE-2022-48937 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2023-52903 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits - The research team at ARMO has demonstrated that popular security solutions, including CrowdStrike’s Falcon, Microsoft Defender, Falco, and Tetragon, are effectively “blind” to malicious activities performed via io_uring—an ...
3 hours ago Cybersecuritynews.com
CVE-2024-39508 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2024-53187 - In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: ...
3 months ago Tenable.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
Linux 'io_uring' security blindspot allows stealthy rootkit attacks - The flaw was discovered by ARMO security researchers who developed a proof-of-concept rootkit called "Curing" to demonstrate the practicality and feasibility of attacks leveraging io_uring for evasion. The researchers explain that io_uring supports a ...
5 hours ago Bleepingcomputer.com
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
CVE-2021-47124 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2021-47292 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
CVE-2024-56762 - In the Linux kernel, the following vulnerability has been resolved: io_uring/sqpoll: fix sqpoll error handling races BUG: KASAN: slab-use-after-free in __lock_acquire+0x370b/0x4a10 kernel/locking/lockdep.c:5089 Call Trace: ... ...
3 months ago Tenable.com
CVE-2024-42254 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Blind Eagle Hackers Leveraging Google Drive, Dropbox & GitHub To Bypass Security Defenses - After infection, Remcos can capture user credentials by logging keystrokes and stealing stored passwords, modify and delete files to sabotage systems or encrypt data for ransom, establish persistence through scheduled tasks and registry modifications ...
1 month ago Cybersecuritynews.com CVE-2024-43451 APT-C-36
CVE-2021-47569 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
New Linux Kernel Rust Module Unveiled to Detect Rootkits - The module represents a significant advancement in Linux security tooling, addressing the critical need for modern detection mechanisms against increasingly sophisticated kernel-level threats. The new detection module was developed as part of a ...
1 month ago Cybersecuritynews.com
CISOs See Software Supply Chain Security As Bigger Blind Spot Than GenAI: Cycode - PRESS RELEASE. SAN FRANCISCO, Dec. 06, 2023 - Cycode, the leader in Application Security Posture Management, today announced the inaugural State of ASPM 2024 report, the industry's first. The research found that AppSec chaos reigns, with 78% of CISOs ...
1 year ago Darkreading.com
Server-Side Request Forgery Attack Explained: Definition, Types, Protection - A Server-Side Request Forgery attack is a security vulnerability in which a hacker tricks a server into accessing unintended resources on his behalf. An SSRF attack can lead to sensitive information being leaked or the attacker gaining control of ...
2 years ago Heimdalsecurity.com
CVE-2023-52654 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2024-53052 - In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write When io_uring starts a write, it'll call kiocb_start_write() to bump the super block rwsem, preventing any freezes from ...
5 months ago Tenable.com
CVE-2024-40922 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
3 weeks ago Cybersecuritynews.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
6 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)