CVE-2024-47678

5.5 MEDIUM

📋 TL;DR

This CVE addresses a side-channel vulnerability in the Linux kernel's ICMP rate limiting implementation. The vulnerability could allow attackers to infer information about network activity by observing ICMP response patterns. All Linux systems using affected kernel versions are potentially vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE description; check kernel commit history for exact ranges
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in ICMP handling code; all systems with ICMP enabled are affected

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure allowing attackers to map internal network topology, identify active hosts, or infer traffic patterns through timing analysis of ICMP responses.

🟠

Likely Case

Limited information leakage about network configuration and host availability, potentially aiding reconnaissance for further attacks.

🟢

If Mitigated

Minimal impact with proper network segmentation, firewall rules, and ICMP filtering in place.

🌐 Internet-Facing: MEDIUM - Internet-facing systems could leak information about internal network structure to external attackers.
🏢 Internal Only: LOW - Requires network access; internal attackers already have some visibility.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access and ability to send/receive ICMP packets; timing analysis required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 483397b4ba280813e4a9c161a0a85172ddb43d19, 662ec52260cc07b9ae53ecd3925183c29d34288b, 8c2bd38b95f75f3d2a08c93e35303e26d480d24e, 997ba8889611891f91e8ad83583466aeab6239a3, a7722921adb046e3836eb84372241f32584bdb07

Vendor Advisory: https://git.kernel.org/stable/c/

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version 2. Reboot system 3. Verify kernel version with 'uname -r'

🔧 Temporary Workarounds

Disable ICMP responses

linux

Block ICMP echo replies and other ICMP messages at firewall level

iptables -A OUTPUT -p icmp --icmp-type echo-reply -j DROP
iptables -A OUTPUT -p icmp --icmp-type destination-unreachable -j DROP

Rate limit ICMP at network perimeter

linux

Apply strict rate limiting to ICMP traffic at network boundaries

iptables -A INPUT -p icmp -m limit --limit 10/second -j ACCEPT
iptables -A INPUT -p icmp -j DROP

🧯 If You Can't Patch

  • Implement strict ICMP filtering at network perimeter firewalls
  • Deploy network segmentation to limit lateral movement if information is leaked

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with patched versions; examine if ICMP rate limiting is applied in correct order (requires kernel source analysis)

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains the fix commits; test ICMP response behavior under load

📡 Detection & Monitoring

Log Indicators:

  • Unusual ICMP traffic patterns
  • High volume of ICMP requests from single sources

Network Indicators:

  • Abnormal ICMP response timing patterns
  • Reconnaissance activity using ICMP

SIEM Query:

source_ip=* AND protocol=ICMP AND count > 1000 per hour

🔗 References

📤 Share & Export