Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·5/12/2023

CVE-2014-0196 added to CISA KEV: Linux Kernel

Status: ✅ Confirmed exploited in the wild

Date added: 2023-05-12

Required action: The impacted product is end-of-life and should be disconnected if still in use.

Due date: 2023-06-02

Why this matters

Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.