Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-5290
HistoryAug 07, 2024 - 9:16 a.m.

CVE-2024-5290

2024-08-0709:16:05
Debian Security Bug Tracker
security-tracker.debian.org
5
ubuntu
wpa_supplicant
system compromise
vulnerability

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0

Percentile

5.1%

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

OSVersionArchitecturePackageVersionFilename
Debian12allwpa< 2:2.10-12+deb12u2wpa_2:2.10-12+deb12u2_all.deb
Debian11allwpa< 2:2.9.0-21+deb11u2wpa_2:2.9.0-21+deb11u2_all.deb
Debian999allwpa< 2:2.10-22wpa_2:2.10-22_all.deb
Debian13allwpa< 2:2.10-22wpa_2:2.10-22_all.deb

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0

Percentile

5.1%