Unknown
CVE-2024-9050
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the leftupdown
key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system’s network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- Red Hat
Products
- Red Hat Enterprise Linux 7.7 Advanced Update Support,
- Red Hat Enterprise Linux 7 Extended Lifecycle Support,
- Red Hat Enterprise Linux 8,
- Red Hat Enterprise Linux 8.2 Advanced Update Support,
- Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,
- Red Hat Enterprise Linux 8.4 Telecommunications Update Service,
- Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions,
- Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,
- Red Hat Enterprise Linux 8.6 Telecommunications Update Service,
- Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions,
- Red Hat Enterprise Linux 8.8 Extended Update Support,
- Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions,
- Red Hat Enterprise Linux 9.2 Extended Update Support,
- Red Hat Enterprise Linux 9
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: