That’s how the Just-In-Time Access Approval Linux Terminal Bug went from theory to a very real, very costly incident. In a world where JIT access workflows are supposed to tighten control, this flaw flips the script. The terminal session didn’t just grant temporary rights—it left a door open. And by the time it closed, it was too late.
The bug appears when certain approval flows delay revoking privileges after a session ends. Instead of immediately locking down the account, the system lingers. A user, or an attacker with their shell, can execute commands beyond the approved time. It’s not about complex payloads or exotic exploits—this is about timing.
JIT access exists to shrink the attack surface. Engineers get elevated Linux rights only when they need them, for as short a window as possible. But the Linux terminal bug erodes that window control. Under certain conditions, the sudo or root shell remains alive in the background. Scripts keep running. Commands keep landing. Logging may still occur, but response is reactive—by the time ops sees the entries, the activity is already complete.