An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root).




Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Wpa Supplicant Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5739-1 wpa security update
EUVD EUVD EUVD-2024-46526 An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Ubuntu USN Ubuntu USN USN-6945-1 wpa_supplicant and hostapd vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical ubuntu Linux
CPEs cpe:2.3:a:w1.fi:wpa_supplicant:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical ubuntu Linux

Wed, 11 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
References

Thu, 29 Aug 2024 19:00:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Important

threat_severity

Moderate


Wed, 07 Aug 2024 17:15:00 +0000

Type Values Removed Values Added
Title wpa_supplicant: wpa_supplicant loading arbitrary shared objects allowing privilege escalation
References
Metrics threat_severity

None

threat_severity

Important


Wed, 07 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared W1.fi
W1.fi wpa Supplicant
CPEs cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*
Vendors & Products W1.fi
W1.fi wpa Supplicant
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 Aug 2024 08:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-18T15:39:53.818Z

Reserved: 2024-05-23T21:10:21.160Z

Link: CVE-2024-5290

cve-icon Vulnrichment

Updated: 2024-08-07T14:04:34.876Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-07T09:16:05.553

Modified: 2024-09-17T13:09:13.683

Link: CVE-2024-5290

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-07T00:00:00Z

Links: CVE-2024-5290 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses