Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Feb 14, 2022 | Updated Oct 13, 2025

Exploit:Linux/CVE-2021-4034.B!MTB

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Exploit:Linux/CVE-2021-4034.B!MTB is an exploit that has been weaponized to take advantage of a core vulnerability in pkexec, a setuid root program that has had the vulnerability since its first distribution in 2009. Vulnerability is a memory corruption vulnerability; this is an out-of-bounds read/write issue. The exploit, when successful, gives any local unprivileged user the ability to launch arbitrary code as the root user with full root privileges on the target host. It is important to distinguish this is not a common "malware" that comes in and lives in the environment, it is an exploit in a local setting established to take advantage of flaw in the GNU/Linux component. 

  • Unplug the Ethernet cable or disable Wi-Fi to prevent the malware from communicating with its C2 servers and exfiltrating your data. 
  • Review system and security logs for the timeline of the attack and look for any subsequent malicious activity performed with root privileges. 
  • Apply the official security patch for your Linux distribution. Update the polkit package immediately. All major distributions have released patched versions. 
  • Assume the root account is compromised. Audit all user sessions and check for unauthorized root access.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us