CVE-2024-1086
high-risk
Published 2024-01-31
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
Do I need to act?
!
85.4% chance of exploitation in next 30 days
EPSS score — higher than 15% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (13)
Affected Vendors
References (29)
Issue Tracking
https://news.ycombinator.com/item?id=39828424
Exploit
https://pwning.tech/nftables/
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0009/
and 9 more references
68
/ 100
high-risk
Severity
24/34 · High
Exploitability
27/34 · High
Exposure
17/34 · Moderate