Lyrie
active-exploitation
ACTIVELY EXPLOITED3 sources verified·4 min read
By Lyrie Threat Intelligence·6/17/2025

What happened

CISA added CVE-2023-0386 to the Known Exploited Vulnerabilities catalog on 2025-06-17, signaling observed in-the-wild abuse and setting a remediation due date of 2025-07-08 CISA KEV. The entry describes an improper ownership management flaw in the Linux kernel’s OverlayFS subsystem that enables unauthorized execution paths tied to setuid/capabilities when a user copies a capable file from a nosuid mount into another mount CISA KEV. NVD classifies this as a Linux kernel vulnerability that allows a local attacker to escalate privileges on affected systems NVD CVE-2023-0386, with the CVE record maintained by MITRE confirming the issue scope and impact MITRE CVE-2023-0386.

Why it matters

A KEV listing means exploitation is confirmed, and federal deadlines apply for remediation prioritization CISA KEV. CVE-2023-0386 elevates a local user’s privileges via OverlayFS logic errors around capability/setuid handling, eroding core Linux privilege boundaries on impacted hosts NVD CVE-2023-0386. Because the attack vector is local, environments that permit unprivileged accounts or scheduled jobs on shared systems carry outsized risk relative to single-user appliances NVD CVE-2023-0386. The authoritative CVE record aligns on this being a kernel-level issue rather than an application flaw, which broadens potential exposure across distributions shipping vulnerable kernels MITRE CVE-2023-0386.

Technical detail

Per the KEV description, the bug sits in OverlayFS’s treatment of file capabilities when copying from a nosuid mount into a different mount, enabling unauthorized execution semantics associated with setuid/capability-bearing files CISA KEV. In practice, a local user can leverage a UID mapping edge case to retain or activate capabilities across mounts, then trigger execution with elevated effect—i.e., a classic local privilege escalation (LPE) path NVD CVE-2023-0386. The formal CVE entry confirms it as improper privilege/ownership management in the Linux kernel’s OverlayFS, consistent with CWE-282 (Improper Ownership Management) classification for this weakness class NVD CVE-2023-0386.

Key properties and preconditions, aligned across the public records:

  • Component: Linux kernel OverlayFS subsystem MITRE CVE-2023-0386.
  • Impact: Local privilege escalation to elevated permissions on the system NVD CVE-2023-0386.
  • Trigger vector: Copying a file with capabilities from a nosuid mount into another mount under flawed UID/capability handling CISA KEV.

While the specific kernel versions and distro backports aren’t enumerated in the KEV summary, the inclusion in KEV confirms active exploitation and mandates prioritized remediation windows for covered organizations CISA KEV. For authoritative, machine-readable vulnerability metadata and references, track the NVD page and the MITRE CVE record as they update NVD CVE-2023-0386 MITRE CVE-2023-0386.

Defense

  • Patch/mitigate now: Apply vendor fixes or mitigations per the KEV directive; if mitigations are unavailable, follow the required actions (including BOD 22-01 guidance for cloud services) and remediate by the stated due date CISA KEV.
  • Triage by exposure: Prioritize hosts where unprivileged local accounts, scheduled jobs, or interactive sessions are permitted, since the attack vector is local NVD CVE-2023-0386. Environments that gate shell access or interactive logins will reduce practical exposure while patches roll out NVD CVE-2023-0386.
  • Confirm status and scope: Use the NVD and MITRE entries to align vulnerability tracking, severity metadata, and references while validating vendor advisories and kernel updates as they publish NVD CVE-2023-0386 MITRE CVE-2023-0386.
  • Governance: Treat KEV-listed items as must-fix within policy windows; document exceptions with compensating controls only where vendor guidance supports them CISA KEV.

Detection notes: Because the flaw is exploited locally, focus telemetry on privilege transitions and unusual interactions with OverlayFS and capability-bearing binaries on Linux endpoints, using the CVE metadata to orient alerting and response NVD CVE-2023-0386 CISA KEV.

Lyrie Verdict

Local kernel LPEs are exactly the kind of step-up a machine-speed adversary or autonomous agent uses to break containment and kill controls once it lands on a box NVD CVE-2023-0386. CVE-2023-0386’s OverlayFS capability/setuid angle gives that step-up via file operations rather than noisy credential theft, so waiting for human review is a losing bet CISA KEV. Lyrie prioritizes autonomous detection around kernel-surface abuse: correlating OverlayFS copy-up behavior, capability-bearing file writes, and privilege transitions to flag probable exploitation paths for this CVE in near real time MITRE CVE-2023-0386. That machine-speed loop—detect, correlate, and contain on first anomalous transition—cuts off rogue-AI escalation before it becomes root-on-host.

Lyrie Verdict

CVE-2023-0386 is a local kernel LPE that autonomous agents can weaponize for instant step-up; Lyrie’s machine-speed correlation on OverlayFS copy-up, capability-bearing file writes, and privilege transitions blocks that escalation path before root is obtained.