skip to Main Content

Polkit Security Flaw (PwnKit) – What it is and Why Stratodesk Isn’t Affected

A 12-year-old security flaw was just disclosed in a system known as Polkit. Ultimately, Polkit (formerly called PolicyKit) is a toolkit for controlling system-wide privileges in Unix-like operating systems. Its aim is to provide a mechanism for non-privileged processes to communicate with privileged processes.

The fact that this vulnerability has been hiding in plain site for 12+ years might be quite scary for IT leaders. Luckily, Stratodesk NoTouch customers don’t need to be afraid.

As top-notch security is baked into Stratodesk NoTouch at the very most fundamental level, all versions of Stratodesk NoTouch OS are not affected. Furthermore, Stratodesk Virtual Appliance and Stratodesk NoTouch Cloud receive updates automatically, so also are not impacted.

Our software is secure by default, meaning that the mitigation suggested to handle the Polkit exploit has already been a standard part of our process for years.

Day One Security Updates Always

Although Stratodesk NoTouch customers don’t need to worry about “PwnKit” as Stratodesk NoTouch simply isn’t affected, they also can rest assured that whenever a major security exploit becomes a clear and present danger, that our agile development teams will be quick to respond.

As in the case of the Log4Shell, as well as other prominent exploits that affected endpoint deployments at large, we were able to respond immediately. It is thanks to this approach that Stratodesk was recently rated the number one most secure EUC endpoint software in a report published by VDISEC.

Our attention and devotion to the security of our software is the reason enterprises rely on us to keep their endpoint deployments safe against threats on the cyber security horizon.

Polkit Security Flaw (PwnKit) – What it is and Why Stratodesk Isn’t Affected

A 12-year-old security flaw was just disclosed in a system known as Polkit. Ultimately, Polkit (formerly called PolicyKit) is a toolkit for controlling system-wide privileges in Unix-like operating systems. Its aim is to provide a mechanism for non-privileged processes to communicate with privileged processes.

The fact that this vulnerability has been hiding in plain site for 12+ years might be quite scary for IT leaders. Luckily, Stratodesk NoTouch customers don’t need to be afraid.

As top-notch security is baked into Stratodesk NoTouch at the very most fundamental level, all versions of Stratodesk NoTouch OS are not affected. Furthermore, Stratodesk Virtual Appliance and Stratodesk NoTouch Cloud receive updates automatically, so also are not impacted.

Our software is secure by default, meaning that the mitigation suggested to handle the Polkit exploit has already been a standard part of our process for years.

Day One Security Updates Always

Although Stratodesk NoTouch customers don’t need to worry about “PwnKit” as Stratodesk NoTouch simply isn’t affected, they also can rest assured that whenever a major security exploit becomes a clear and present danger, that our agile development teams will be quick to respond.

As in the case of the Log4Shell, as well as other prominent exploits that affected endpoint deployments at large, we were able to respond immediately. It is thanks to this approach that Stratodesk was recently rated the number one most secure EUC endpoint software in a report published by VDISEC.

Our attention and devotion to the security of our software is the reason enterprises rely on us to keep their endpoint deployments safe against threats on the cyber security horizon.

Subscribe to our newsletter:

Back To Top
X