CVE-2024-53149
Linux
CVE-2024-53149 is a Linux Kernel vulnerability involving an off-by-one error in the usb: typec: ucsi: glink: fix off-by-one in connector_status
component. This flaw affects Type-C orientation reporting, specifically impacting the third USB-C connector. The vulnerability stems from incorrect index handling within the UCSI connector status callback, which starts at index 1 instead of 0.
Although CVE-2024-53149 has a relatively low CVSS score of 4.6, the SOCRadar Vulnerability Risk Score (SVRS) is 30. This indicates that while the technical impact may be moderate, the SVRS suggests a lower level of active exploitation or threat actor interest compared to vulnerabilities with higher scores. The risk associated with this bug is primarily incorrect Type-C orientation reporting. While this might not lead to system compromise directly, inaccurate reporting could potentially lead to user confusion or operational issues in systems that rely on correct USB-C port orientation detection.
Description
CVE-2024-53149 affects the Linux kernel and specifically addresses an off-by-one error in the USB Type-C connector status handling. This vulnerability could potentially lead to incorrect Type-C orientation reporting for the third USB-C connector. While the CVSS score is 0, the SVRS score of 42 indicates a potential vulnerability that requires attention.
Key Insights
- Incorrect Orientation Reporting: The vulnerability could result in incorrect reporting of the orientation of the third USB-C connector, which may lead to issues with device compatibility and functionality.
- Potential for Exploitation: While the CVSS score is low, the SVRS score suggests that this vulnerability could potentially be exploited, especially if combined with other vulnerabilities.
- Limited Scope: This vulnerability primarily affects the third USB-C connector, limiting its impact to devices with multiple USB-C ports.
- Kernel-Level Impact: The vulnerability lies within the Linux kernel, indicating the potential for system-level impact if exploited.
Mitigation Strategies
- Kernel Updates: Immediately apply the latest Linux kernel updates to patch this vulnerability.
- Device Configuration: Review and configure device settings related to USB-C connector usage to ensure appropriate handling.
- Security Monitoring: Implement robust security monitoring tools to detect any unusual activity related to USB-C devices or kernel behavior.
- User Awareness: Educate users about potential risks associated with USB-C connectors and the importance of using trusted devices and connections.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.