CVE-2024-36041

7.8 HIGH

📋 TL;DR

This vulnerability in KDE Plasma Workspace allows local users on the same machine to connect to the KSmserver session manager via ICE without proper authentication. Attackers can exploit this to gain access to the victim's session manager and potentially execute arbitrary code on the next system boot. Users running affected versions of KDE Plasma Workspace are at risk.

💻 Affected Systems

Products:
  • KDE Plasma Workspace (plasma-workspace)
Versions: Versions before 5.27.11.1 and 6.x before 6.0.5.1
Operating Systems: Linux distributions with KDE Plasma desktop environment
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with multiple local users where KDE Plasma is running. Single-user systems have reduced risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access can execute arbitrary code as the victim user on system boot, potentially leading to full system compromise, privilege escalation, or persistent backdoor installation.

🟠

Likely Case

Local attackers can hijack user sessions, access sensitive session data, and potentially execute malicious code in the victim's context during session restoration.

🟢

If Mitigated

With proper access controls and user separation, impact is limited to unauthorized session access without code execution.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local system access.
🏢 Internal Only: HIGH - Any multi-user system with affected KDE Plasma versions is vulnerable to local attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of the target user's session. Exploitation involves manipulating session restore via /tmp directory abuse.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.27.11.1 or 6.0.5.1 and later

Vendor Advisory: https://kde.org/info/security/advisory-20240531-1.txt

Restart Required: Yes

Instructions:

1. Update plasma-workspace package using your distribution's package manager. 2. For KDE Plasma 5: Upgrade to version 5.27.11.1 or later. 3. For KDE Plasma 6: Upgrade to version 6.0.5.1 or later. 4. Restart the system or at least restart the KDE session.

🔧 Temporary Workarounds

Restrict local user access

linux

Limit local user accounts to trusted individuals only and implement strict user separation policies.

Monitor /tmp directory usage

linux

Implement monitoring for suspicious file creation or modification in /tmp directories related to KDE sessions.

inotifywait -m /tmp -e create,modify | grep -i kde

🧯 If You Can't Patch

  • Implement strict user access controls and limit local user accounts to essential personnel only.
  • Use separate physical or virtual machines for different users instead of multi-user configurations.

🔍 How to Verify

Check if Vulnerable:

Check plasma-workspace package version: dpkg -l | grep plasma-workspace (Debian/Ubuntu) or rpm -q plasma-workspace (RHEL/Fedora). If version is below 5.27.11.1 for Plasma 5 or below 6.0.5.1 for Plasma 6, system is vulnerable.

Check Version:

plasmashell --version 2>/dev/null | head -1 || echo "Check package manager for plasma-workspace version"

Verify Fix Applied:

Verify plasma-workspace package version is 5.27.11.1 or higher for Plasma 5, or 6.0.5.1 or higher for Plasma 6.

📡 Detection & Monitoring

Log Indicators:

  • Unusual KSmserver connection attempts from different local users
  • Suspicious file operations in /tmp related to KDE session files
  • Unexpected session manager activity

Network Indicators:

  • Local ICE connection attempts between user sessions

SIEM Query:

process_name:"ksmserver" AND event_type:"connection" AND src_user != dst_user

🔗 References

📤 Share & Export