An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
History

Wed, 18 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical ubuntu Linux
CPEs cpe:2.3:a:w1.fi:wpa_supplicant:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical ubuntu Linux

Wed, 11 Sep 2024 16:00:00 +0000

Type Values Removed Values Added
References

Thu, 29 Aug 2024 19:00:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Important

threat_severity

Moderate


Wed, 07 Aug 2024 17:15:00 +0000

Type Values Removed Values Added
Title wpa_supplicant: wpa_supplicant loading arbitrary shared objects allowing privilege escalation
References
Metrics threat_severity

None

threat_severity

Important


Wed, 07 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared W1.fi
W1.fi wpa Supplicant
CPEs cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*
Vendors & Products W1.fi
W1.fi wpa Supplicant
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 Aug 2024 08:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2024-08-07T08:14:08.153Z

Updated: 2024-09-18T15:39:53.818Z

Reserved: 2024-05-23T21:10:21.160Z

Link: CVE-2024-5290

cve-icon Vulnrichment

Updated: 2024-08-07T14:04:34.876Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-07T09:16:05.553

Modified: 2024-09-17T13:09:13.683

Link: CVE-2024-5290

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-07T00:00:00Z

Links: CVE-2024-5290 - Bugzilla