CVE-2024-5290
EUVD-2024-4652607.08.2024, 09:16
An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| w1.fi | wpa_supplicant | - |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| w1.fi | wpa_supplicant | 2:2.10-15 ≤ 𝑥 < 2:2.10-21ubuntu0.1 | ADP |
| w1.fi | wpa_supplicant | 2:2.9.0-21build1 ≤ 𝑥 < 2:2.10-6ubuntu2.1 | ADP |
| w1.fi | wpa_supplicant | 2:2.9-1ubuntu2 ≤ 𝑥 < 2:2.9-1ubuntu4.4 | ADP |
| w1.fi | wpa_supplicant | 2.4-0ubuntu10 ≤ 𝑥 < 2:2.6-15ubuntu2.8+esm1 | ADP |
| w1.fi | wpa_supplicant | 2.4-0ubuntu3 ≤ 𝑥 < 2.4-0ubuntu6.8+esm1 | ADP |
| w1.fi | wpa_supplicant | 2.1-0ubuntu1 ≤ 𝑥 < 2.1-0ubuntu1.7+esm5 | ADP |
Debian Releases
Ubuntu Releases
Common Weakness Enumeration