CVE-2024-9050
📋 TL;DR
This vulnerability allows local unprivileged users to achieve privilege escalation and potentially execute arbitrary code as root. The flaw exists in the libreswan client plugin for NetworkManager where improper sanitization of VPN configuration parameters enables command injection. Affected systems are those running vulnerable versions of NetworkManager-libreswan with Polkit-enabled network configuration.
💻 Affected Systems
- NetworkManager-libreswan
- libreswan client plugin for NetworkManager
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local unprivileged user gains full root access and executes arbitrary code on the system, potentially leading to complete system compromise.
Likely Case
Local privilege escalation allowing attackers to execute commands with root privileges, potentially installing malware, accessing sensitive data, or pivoting to other systems.
If Mitigated
Limited impact with proper access controls and monitoring, though local users could still potentially exploit the vulnerability.
🎯 Exploit Status
Exploitation requires local access but appears straightforward once the vulnerability details are understood. The leftupdown parameter accepts executable commands that run with elevated privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific Red Hat advisories for patched versions
Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:8312
Restart Required: Yes
Instructions:
1. Check your distribution's security advisories
2. Update NetworkManager-libreswan package using your package manager
3. Restart NetworkManager service or reboot the system
4. Verify the patch is applied
🔧 Temporary Workarounds
Restrict VPN configuration permissions
linuxLimit which users can configure VPN settings through Polkit policies
Modify /etc/polkit-1/rules.d/ to restrict network configuration permissions
Disable libreswan plugin if unused
linuxRemove or disable the vulnerable plugin if not required
sudo systemctl stop NetworkManager
sudo apt remove network-manager-libreswan (Debian/Ubuntu)
sudo yum remove NetworkManager-libreswan (RHEL/CentOS)
sudo systemctl start NetworkManager
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable software
- Implement strict monitoring for privilege escalation attempts and unusual root activity
🔍 How to Verify
Check if Vulnerable:
Check installed version of NetworkManager-libreswan and compare with patched versions in Red Hat advisories
Check Version:
rpm -q NetworkManager-libreswan (RHEL/CentOS) or dpkg -l network-manager-libreswan (Debian/Ubuntu)
Verify Fix Applied:
Verify the package version matches or exceeds the patched version from vendor advisories
📡 Detection & Monitoring
Log Indicators:
- Unusual VPN configuration changes by non-privileged users
- Polkit authorization logs showing network configuration requests
- Sudden privilege escalation from user to root
Network Indicators:
- None - this is a local exploitation vulnerability
SIEM Query:
Search for: 'user privilege escalation', 'polkit network configuration', 'unusual root command execution from user session'
🔗 References
- https://access.redhat.com/errata/RHSA-2024:8312
- https://access.redhat.com/errata/RHSA-2024:8338
- https://access.redhat.com/errata/RHSA-2024:8352
- https://access.redhat.com/errata/RHSA-2024:8353
- https://access.redhat.com/errata/RHSA-2024:8354
- https://access.redhat.com/errata/RHSA-2024:8355
- https://access.redhat.com/errata/RHSA-2024:8356
- https://access.redhat.com/errata/RHSA-2024:8357
- https://access.redhat.com/errata/RHSA-2024:8358
- https://access.redhat.com/errata/RHSA-2024:9555
- https://access.redhat.com/errata/RHSA-2024:9556
- https://access.redhat.com/security/cve/CVE-2024-9050
- https://bugzilla.redhat.com/show_bug.cgi?id=2313828
- https://www.openwall.com/lists/oss-security/2024/10/25/1
- http://www.openwall.com/lists/oss-security/2024/10/25/1