Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-5290

Опубликовано: 07 авг. 2024
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

A vulnerability was found in the wpa_supplicant package. This flaw allows a local unprivileged user who is part of the netdev group to achieve privilege escalation to the same user running wpa_supplicant (typically root).

Отчет

This vulnerability requires a specific configuration to be present on the local system running the vulnerable version of the wpa_supplicant binary; specifically, the local unprivileged user must be part of the netdev group. As such, Red Hat considers this to be a moderate vulnerability and not an important one, per our CVE classification policy.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10wpa_supplicantAffected
Red Hat Enterprise Linux 6wpa_supplicantOut of support scope
Red Hat Enterprise Linux 7wpa_supplicantNot affected
Red Hat Enterprise Linux 8wpa_supplicantNot affected
Red Hat Enterprise Linux 9wpa_supplicantWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-427
https://bugzilla.redhat.com/show_bug.cgi?id=2303402wpa_supplicant: wpa_supplicant loading arbitrary shared objects allowing privilege escalation

EPSS

Процентиль: 4%
0.00022
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

CVSS3: 8.8
nvd
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

CVSS3: 8.8
debian
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in load ...

CVSS3: 8.8
github
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 4%
0.00022
Низкий

6.4 Medium

CVSS3