Skip to main content
HIGHGHSA-rfgw-vmxp-hp5g
Affected projects
falco
Disclosed
Last updated

Affected versions

ProjectVulnerable range
Falco<0.28.1

Patched versions

ProjectFixed in
Falco0.28.1

References

Summary

Multiple techniques were identified that allow attackers to circumvent Falco's default detection rule sets. The advisory describes four distinct bypass categories: writing a file to a temporary location and then moving it to the target path to evade file-write detection rules; using non-standard chmod modes (such as 0477 or 6777) that are not covered by rules checking only for 4777; crafting command lines that contain a trusted path string while still accessing sensitive files, exploiting the use of proc.cmdline with contains or startswith operators; and accessing files through system-level symlinks such as /proc/self/root or other existing symlinks to bypass rules that assume paths are absolute. These gaps affect users relying on Falco versions before 0.28.1 without applying updated rule sets.

Impact

Users relying on Falco's default rule sets without upgrading to version 0.28.1 or later may fail to detect common attack behaviors specifically crafted to evade rule conditions. The affected detection categories include file write monitoring, SUID/SGID permission changes, sensitive file reads (such as /etc/shadow), and path-based access monitoring. The advisory notes that the predefined rule sets are not intended to cover all possible attack cases and that users should customize rules to meet their specific environment's needs.

Detection

The advisory itself identifies the detection gaps present in rule sets shipped before version 0.28.1. Users running older Falco versions should verify their alerting coverage for the following patterns: file writes performed via a temporary file followed by a move operation; chmod calls using modes other than those explicitly listed in rules; sensitive file reads where the command line contains an expected trusted string alongside additional paths; and file access through symlinks such as /proc/self/root. Reviewing active Falco rule files for overly specific proc.cmdline contains and fd.name startswith conditions will identify rules susceptible to these bypass techniques.

Mitigation

Upgrade Falco to version 0.28.1 or later, which includes updated rule sets that address the identified bypass techniques. Note that newer rule sets specify a required_engine_version that may be incompatible with older Falco engine versions, making a full Falco version upgrade necessary rather than a rule-file-only update. After upgrading, customize the default rule sets to cover attack patterns specific to your environment — the default rules are designed to address main attack vectors and are not a comprehensive detection solution. Extending rules beyond the defaults, particularly for sensitive file access and permission changes, is strongly recommended.

References