CVE-2024-26995

7.8 HIGH

📋 TL;DR

This CVE-2024-26995 is an off-by-one vulnerability in the Linux kernel's USB Type-C Power Delivery (PD) subsystem that can cause incorrect power negotiation between devices. When exploited, it may lead to over-voltage or over-current conditions, potentially damaging connected hardware. Any system running an affected Linux kernel version with USB Type-C PD functionality is vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches available in stable kernel trees (see references).
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with USB Type-C Power Delivery functionality enabled/used. Requires physical USB Type-C connection to exploit.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Physical damage to USB Type-C devices, ports, or connected hardware due to incorrect power delivery causing over-voltage or over-current conditions.

🟠

Likely Case

Unexpected device behavior, port resets, or power delivery failures during USB Type-C power negotiation.

🟢

If Mitigated

No impact if proper power protection circuits exist in hardware or if USB Type-C PD functionality is disabled.

🌐 Internet-Facing: LOW - This vulnerability requires physical access or local USB connection, not network exploitation.
🏢 Internal Only: MEDIUM - Risk exists for any system with USB Type-C ports and affected kernel, but requires physical device connection.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical USB Type-C connection to vulnerable system. No authentication needed once physical access/connection established.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel trees (commits c4128304c2169b4664ed6fb6200f228cead2ab70 and f3da3192cdd3fefe213390e976eec424a8e270b5)

Vendor Advisory: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable USB Type-C Power Delivery

linux

Disable USB Type-C PD functionality to prevent exploitation (if not required for system operation).

echo 'blacklist typec' > /etc/modprobe.d/disable-typec.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict physical access to USB Type-C ports using physical security measures.
  • Use only trusted USB Type-C devices and cables from verified manufacturers.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution security advisories. Check if USB Type-C modules are loaded: lsmod | grep -i typec

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version from distribution. Check that USB Type-C functionality still works properly with test devices.

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing USB Type-C PD errors, power negotiation failures, or unexpected port resets
  • System logs showing hardware protection triggers or power delivery issues

Network Indicators:

  • Not applicable - local hardware vulnerability

SIEM Query:

Not applicable for network detection - monitor system/kernel logs for USB Type-C PD errors

🔗 References

📤 Share & Export