CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Trustwave Action Response: Polkit Privilege Escalation Vulnerability - PwnKit (CVE-2021-4034)

Summary of Trustwave Actions (updated 1/26/2022):

Trustwave security and engineering teams became aware of the vulnerability in Polkit's pkexec component identified as CVE-2021-4034 (PwnKit) on January 25. We immediately investigated the vulnerability and potential exploits and continue to actively monitor the situation for our clients.

All major Linux distributions have made patches available, including Debian (, Ubuntu (, and RedHat ( Check your distribution for specific patches. As part of a strong patch management program, ensuring your infrastructure and applications are up to date is critical for mitigating cyber risk.

Administrators should be able to temporarily or alternatively mitigate exploitation by removing the SUID-bit from pkexec until a patch can be put in place.

For example: # chmod 0755 /usr/bin/pkexec

As a response tactic, we recommend clients utilize an Endpoint Detection and Response (EDR) solution capable of detecting this exploit. Most major EDR providers should have or will be releasing an emergency update to automatically detect the exploit. Solutions, where policy management is under Trustwave support, will receive those updates as they become available from vendors.

Trustwave is currently triaging this vulnerability and taking mitigation actions within our environments.

Trustwave MDR Advanced Clients:

For MDR Advanced clients, Trustwave is actively threat hunting attempts to exploit this vulnerability. 

The Trustwave Threat Hunting team has also published a practical guide to help the cybersecurity community address the vulnerability by identifying common behavior in exploitation.

Trustwave Product Updates:

Trustwave is actively working on checks for its scanner to detect this vulnerability. We will update the blog once the scanner update has been released. We will expedite the release of the update if the vulnerability and exploitation situation rapidly evolves.

What is CVE-2021-4034 (PwnKit)?

According to the Qualys Research Team who discovered this vulnerability, this is a “memory corruption vulnerability in polkit’s pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.”

Quick Facts:

  • The vulnerability resides in "polkit" (formerly PolicyKit) and has existed in that code for over 12 years. This software is found by default in essentially all modern Linux distributions.
  • Specifically, it affects how "polkit" invokes "pkexec", a process that allows unprivileged users to interact with root level processes.
  • Qualys has exploited this vulnerability under Ubuntu, Debian, Fedora, and CentOS in their tests. It's assumed even minor distributions are also all affected.

The Potential Danger of CVE-2021-4034

A Privilege Escalation vulnerability allows an unprivileged local user to get full root privileges. The danger from any privilege escalation vulnerability such as CVE-2021-4034 is it can allow an unprivileged local user to get full root privileges. If a threat actor pairs the polkit escalation issue with a remote code execution vulnerability, the attacker can gain code execution as root with no limitations. With this widespread Privileged Escalation vulnerability, criminals may be looking for remote code execution (RCE) vulnerabilities that may be effective when paired with this vulnerability.


Qualys research blog: PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034)

Dark Reading article with insights from Trustwave SpiderLabs: Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit  

Threat Hunting guide for CVE-2021-4034 by Trustwave Threat Hunting Team: Trustwave Threat Hunting Guide: Identifying PwnKit (CVE-2021-4034) Exploitation

Latest SpiderLabs Blogs

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

Overview A command injection vulnerability has been discovered in the GlobalProtect feature within Palo Alto Networks PAN-OS software for specific versions that have distinct feature configurations...

Read More


We all know the cybersecurity industry loves its acronyms, but just because this fact is widely known doesn’t mean everyone knows the story behind the alphabet soup groups of letters, we must deal...

Read More

Phishing Deception - Suspended Domains Reveal Malicious Payload for Latin American Region

Recently, we observed a phishing campaign targeting the Latin American region. The phishing email contained a ZIP file attachment that when extracted reveals an HTML file that leads to a malicious...

Read More