CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wpa | < 2:2.10-12+deb12u2 | wpa_2:2.10-12+deb12u2_all.deb |
Debian | 11 | all | wpa | < 2:2.9.0-21+deb11u2 | wpa_2:2.9.0-21+deb11u2_all.deb |
Debian | 999 | all | wpa | < 2:2.10-22 | wpa_2:2.10-22_all.deb |
Debian | 13 | all | wpa | < 2:2.10-22 | wpa_2:2.10-22_all.deb |