If you experience any difficulty in accessing content on our website, please contact us at 1-866-333-8917 or email us at support@chicagovps.net and we will make every effort to assist you.

By
April 27, 2025

Israeli Vendor Unveils Proof-of-Concept Bypass Highlighting Flaws in Linux Security Tools

 

An Israeli company, Armo, has demonstrated significant security vulnerabilities in leading Linux runtime tools with a proof-of-concept (PoC) rootkit named ‘Curing’. This rootkit exposes the shortcomings of prominent security solutions by successfully evading detection from several tools, including Falco, Tetragon, and Microsoft Defender.

Curing incorporates the io_uring Linux kernel interface to operate efficiently, allowing it to bypass system calls, which traditional security measures often monitor. Falco, for instance, could not detect the rootkit at all. Microsoft Defender exhibited similar failures, unable to identify not just Curing, but a variety of other common malware. Tetragon was somewhat more effective, detecting io_uring usage but only when certain advanced probing features were activated—features that are not enabled by default.

According to Armo, these failures stem from a narrow dependence on eBPF-based agents that overlook critical system activities, particularly those that utilize io_uring, which can execute functions without invoking system calls. The firm emphasizes that this oversight represents a serious limitation of existing security products, as eBPF’s approach may leave systems vulnerable to sophisticated attacks that do not trigger standard monitoring protocols.

The io_uring API was introduced in Linux 5.1 to improve asynchronous I/O performance and has, unfortunately, been linked to numerous vulnerabilities since its implementation. Armo’s motivation for developing Curing was twofold: to highlight the cybersecurity risks associated with the io_uring interface, which they believe have not been adequately addressed by vendors, and to prompt a reevaluation of architectural frameworks within Linux security solutions.

In response to Armo’s findings, some vendors acknowledged the issues. For example, Falco’s maintainers recognized the need for improved detection capabilities and are reportedly working on a plugin to enhance visibility. In contrast, interactions with Microsoft regarding these vulnerabilities proved less fruitful, as they did not respond. Tetragon’s developers refuted Armo’s claims, asserting that their solution does not solely rely on syscall monitoring and employs more robust detection methods.

Despite the potential self-promotion angle, Armo concludes that improved Linux security needs to be proactive, focusing on anticipating future threats rather than merely reacting to existing vulnerabilities. They suggest that security providers should monitor for unusual usage patterns within the io_uring interface to enhance system defenses.

For further insights, you can explore more about the issues surrounding the io_uring interface in the security landscape.


ChicagoVPS is your gateway to unparalleled hosting solutions. Our state-of-the-art datacenters and powerful network ensures lightning-fast speeds and uninterrupted connectivity for your websites and applications. Whether you’re a startup looking for scalable resources or an enterprise in need of enterprise-grade hosting, our range of plans and customizable solutions guarantee a perfect fit. Trust in ChicagoVPS to deliver excellence, combining unmatched reliability and top-tier support.

For Inquiries or to receive a personalized quote, please reach out to us through our contact form here or email us at sales@chicagovps.net.

Subscribe Email

Top