// For flags

CVE-2024-5138

 

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.

El componente snapctl dentro de snapd permite que un complemento confinado interactúe con el daemon snapd para realizar ciertas acciones privilegiadas en nombre del complemento. Se descubrió que snapctl no analizaba adecuadamente los argumentos de la línea de comandos, lo que permitía a un usuario sin privilegios activar una acción autorizada en nombre del complemento que normalmente requeriría privilegios de administrador para realizarse. Esto posiblemente podría permitir que un usuario sin privilegios realice una denegación de servicio o algo similar.

*Credits: Rory McNamara from Snyk Security Labs
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-19 CVE Reserved
  • 2024-05-31 CVE Published
  • 2024-06-01 EPSS Updated
  • 2024-09-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -