Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0193: Use After Free

0
High
VulnerabilityCVE-2024-0193cvecve-2024-0193
Published: Tue Jan 02 2024 (01/02/2024, 18:05:13 UTC)
Source: CVE Database V5

Description

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.

AI-Powered Analysis

AILast updated: 10/09/2025, 12:23:39 UTC

Technical Analysis

CVE-2024-0193 is a use-after-free vulnerability identified in the netfilter subsystem of the Linux kernel, specifically related to the handling of the catchall element during the removal of a pipapo set. The flaw arises because the catchall element can be garbage-collected twice, which leads to a use-after-free condition on NFT_CHAIN or NFT_OBJECT kernel objects. Netfilter is a core component responsible for packet filtering, network address translation, and other packet mangling operations in Linux. The vulnerability allows a local attacker who possesses the CAP_NET_ADMIN capability—a capability typically granted to network administrators or certain privileged processes—to escalate their privileges on the system. Exploitation does not require user interaction but does require local access and the specific capability. The impact of this vulnerability is significant as it compromises confidentiality, integrity, and availability by enabling privilege escalation, potentially allowing attackers to execute arbitrary code with kernel privileges or cause system crashes. Although no known exploits are currently reported in the wild, the high CVSS score of 7.8 reflects the severity and ease of exploitation given the required conditions. The vulnerability affects Linux kernel versions with netfilter enabled, but specific affected versions are not detailed in the provided information. The flaw was publicly disclosed on January 2, 2024, and assigned by Red Hat. Mitigation typically involves applying kernel patches released by Linux distribution vendors and minimizing the assignment of CAP_NET_ADMIN capabilities to untrusted users or processes.

Potential Impact

For European organizations, this vulnerability poses a serious risk, especially for those relying heavily on Linux-based infrastructure for networking, servers, and critical applications. The ability for a local user with CAP_NET_ADMIN to escalate privileges can lead to full system compromise, data breaches, disruption of services, and potential lateral movement within networks. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure are particularly vulnerable due to their reliance on secure and stable Linux environments. The vulnerability could be exploited by malicious insiders or attackers who gain initial local access through other means. Given the widespread use of Linux in European data centers and cloud environments, the impact could be extensive if not addressed promptly. Additionally, the compromise of network filtering components could allow attackers to manipulate network traffic, evade detection, or disrupt network operations.

Mitigation Recommendations

1. Apply official patches and kernel updates from Linux distribution vendors as soon as they become available to address CVE-2024-0193. 2. Audit and restrict the assignment of CAP_NET_ADMIN capability to only trusted administrators and processes; avoid granting it to unprivileged users or unnecessary services. 3. Employ strict access controls and monitoring on systems with netfilter enabled to detect unusual privilege escalations or suspicious activities. 4. Use kernel security modules such as SELinux or AppArmor to enforce least privilege and contain potential exploitation. 5. Regularly review and update network filtering rules and configurations to minimize attack surface. 6. Implement robust logging and alerting mechanisms for CAP_NET_ADMIN usage and kernel-level events. 7. Conduct internal security assessments and penetration tests focusing on privilege escalation vectors involving netfilter and related kernel components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-02T10:58:11.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7a5cfba0e608b4f98d817

Added to database: 10/9/2025, 12:08:47 PM

Last enriched: 10/9/2025, 12:23:39 PM

Last updated: 10/15/2025, 8:13:24 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats