Skip to content

Commit

Permalink
new(rules): detect unprivileged (successful) userfaultfd syscalls
Browse files Browse the repository at this point in the history
Signed-off-by: Leonardo Di Donato <leodidonato@gmail.com>
  • Loading branch information
leodido authored and poiana committed Jun 23, 2021
1 parent 8216b43 commit 9bc942c
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions rules/falco_rules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3056,6 +3056,16 @@
priority: WARNING
tags: [container, cis, mitre_lateral_movement]

- rule: Unprivileged Delegation of Page Faults Handling to a Userspace Process
desc: Detect a successful unprivileged userfaultfd syscall which might act as an attack primitive to exploit other bugs
condition: >
evt.type = userfaultfd and
user.uid != 0 and
(evt.rawres >= 0 or evt.res != -1)
output: An userfaultfd syscall was successfully executed by an unprivileged user (user=%user.name user_loginuid=%user.loginuid command=%proc.cmdline %container.info image=%container.image.repository:%container.image.tag)
priority: CRITICAL
tags: [process, mitre_defense_evasion]

# Application rules have moved to application_rules.yaml. Please look
# there if you want to enable them by adding to
# falco_rules.local.yaml.
Expand Down

0 comments on commit 9bc942c

Please sign in to comment.