CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-45752

High Severity
SVRS
66/100

CVSSv3
7.3/10

EPSS
0.0001/1

CVE-2024-45752 is a privilege escalation vulnerability in logiops versions up to 0.3.4. This flaw enables any unprivileged user to manipulate the logid daemon via an unrestricted D-Bus service. This manipulation includes the ability to configure malicious keyboard macros.

Although the CVSS score is 7.3, the SOCRadar Vulnerability Risk Score (SVRS) of 66 indicates a moderate risk, suggesting that while not immediately critical, the vulnerability requires prompt attention. The ability to set malicious keyboard macros can lead to significant security breaches with minimal user interaction, ultimately resulting in privilege escalation. This vulnerability is significant because it bypasses typical security measures, allowing attackers to gain higher-level access to the system by exploiting a misconfiguration in the D-Bus service. Organizations using logiops should apply the necessary patches or mitigations to prevent unauthorized access and potential system compromise.

No tags available
CVSS:3.1
AV:L
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:L
2024-09-19

2024-09-25
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-45752 is a privilege escalation vulnerability in logiops through 0.3.4. It allows any unprivileged user to configure the logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This could lead to privilege escalation with minimal user interaction. The SVRS for this CVE is 38, indicating a moderate risk.

Key Insights

  • This vulnerability could allow an attacker to gain elevated privileges on a target system.
  • The vulnerability is easy to exploit and requires minimal user interaction.
  • The vulnerability is present in the default configuration of logiops.

Mitigation Strategies

  • Update logiops to version 0.3.5 or later.
  • Restrict access to the D-Bus service used by logiops.
  • Monitor for suspicious activity and take appropriate action if necessary.

Additional Information

  • There are no known active exploits for this vulnerability.
  • CISA has not issued a warning for this vulnerability.
  • The vulnerability is not known to be used in the wild.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-45752 | logiops up to 0.3.4 logid Daemon access control (Nessus ID 211334)
vuldb.com2024-11-15
CVE-2024-45752 | logiops up to 0.3.4 logid Daemon access control (Nessus ID 211334) | A vulnerability classified as critical was found in logiops up to 0.3.4. Affected by this vulnerability is an unknown functionality of the component logid Daemon. The manipulation leads to improper access controls. This vulnerability is known as CVE-2024-45752. The attack needs to be done within the local network
vuldb.com
rss
forum
news

Social Media

CVE-2024-45752 logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting m… https://t.co/FAuqLOOKb2
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://bugzilla.suse.com/show_bug.cgi?id=1226598
[email protected]https://github.com/PixlOne/logiops/releases
GITHUBhttps://bugzilla.suse.com/show_bug.cgi?id=1226598

CWE Details

CWE IDCWE NameDescription
CWE-269Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence