diff --git a/rules/falco_rules.yaml b/rules/falco_rules.yaml index 5d952a2a..618ff2d9 100644 --- a/rules/falco_rules.yaml +++ b/rules/falco_rules.yaml @@ -3056,10 +3056,13 @@ priority: WARNING tags: [container, cis, mitre_lateral_movement] +- macro: consider_userfaultfd_activities + condition: (always_true) + - rule: Unprivileged Delegation of Page Faults Handling to a Userspace Process desc: Detect a successful unprivileged userfaultfd syscall which might act as an attack primitive to exploit other bugs condition: > - evt.type = userfaultfd and + consider_userfaultfd_activities and evt.type = userfaultfd and user.uid != 0 and (evt.rawres >= 0 or evt.res != -1) output: An userfaultfd syscall was successfully executed by an unprivileged user (user=%user.name user_loginuid=%user.loginuid command=%proc.cmdline %container.info image=%container.image.repository:%container.image.tag)