ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·9/15/2022
CVE-2013-6282 added to CISA KEV: Linux Kernel
Status: ✅ Confirmed exploited in the wild
Date added: 2022-09-15
Required action: Apply updates per vendor instructions.
Due date: 2022-10-06
Why this matters
The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation.
Sources
Lyrie Verdict
Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.