← Back to SOC feed Coverage →

Linux-DynoRoot-CVE-2018-1111

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may attempt to exploit the DHCP remote code command injection vulnerability (CVE-2018-1111) by injecting malicious commands into process arguments, leveraging DynoRoot for persistence. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential command injection attacks targeting Linux systems.

KQL Query

DeviceProcessEvents
| where InitiatingProcessCommandLine contains "/etc/NetworkManager/dispatcher.d/"
    and InitiatingProcessCommandLine contains "-dhclient"
    and isnotempty(ProcessCommandLine)
    and FileName !endswith ".exe"
| project Timestamp, DeviceName , FileName, ProcessCommandLine, InitiatingProcessCommandLine 

Analytic Rule Definition

id: 445a1251-b7ad-44db-8b86-51d79b34e726
name: Linux-DynoRoot-CVE-2018-1111
description: |
  The query checks process command lines arguments and parent/child combinations to find machines where there have been.
  Attempts to exploit a DHCP remote code command injection CVE-2018-1111.
  DynoRoot is a remote command injection present in a script included by the DHCP client in Red Hat Enterprise Linux 6 and 7.
  Using it, a malicious attacker could use this flaw to execute arbitrary commands with root privileges.
  CVE: CVE-2018-1111.
  Read more here:.
  Https://access.redhat.com/security/cve/cve-2018-1111.
  Https://www.cvedetails.com/cve/CVE-2018-1111.
  Tags: #exploit #CVE-2018-1111 #DynoRoot.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
query: |
  DeviceProcessEvents
  | where InitiatingProcessCommandLine contains "/etc/NetworkManager/dispatcher.d/"
      and InitiatingProcessCommandLine contains "-dhclient"
      and isnotempty(ProcessCommandLine)
      and FileName !endswith ".exe"
  | project Timestamp, DeviceName , FileName, ProcessCommandLine, InitiatingProcessCommandLine 

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/Linux-DynoRoot-CVE-2018-1111.yaml