Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0193: Use After Free

0
High
VulnerabilityCVE-2024-0193cvecve-2024-0193
Published: Tue Jan 02 2024 (01/02/2024, 18:05:13 UTC)
Source: CVE Database V5

Description

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:10:09 UTC

Technical Analysis

CVE-2024-0193 is a high-severity use-after-free vulnerability identified in the netfilter subsystem of the Linux kernel. The issue arises specifically when the catchall element is garbage-collected during the removal of a pipapo set, causing the element to be deactivated twice. This double deactivation leads to a use-after-free condition on either an NFT_CHAIN or NFT_OBJECT structure. Use-after-free vulnerabilities can cause memory corruption, leading to unpredictable behavior including privilege escalation or system crashes. In this case, a local attacker possessing the CAP_NET_ADMIN capability—a capability that allows network administration tasks—can exploit this flaw to escalate their privileges on the system. The vulnerability does not require user interaction but does require local access with specific capabilities, limiting remote exploitation potential. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability. No public exploits or active exploitation in the wild have been reported yet. The vulnerability affects Linux kernel versions that include the vulnerable netfilter code, although specific affected versions are not listed. The netfilter subsystem is widely used for packet filtering and firewall functionality in Linux, making this vulnerability relevant for many Linux-based systems, especially servers and network appliances. The flaw was reserved and published in early 2024, and vendors are expected to release patches to address it.

Potential Impact

The primary impact of CVE-2024-0193 is local privilege escalation, allowing an attacker with limited capabilities (CAP_NET_ADMIN) to gain higher privileges, potentially root-level access. This can lead to full system compromise, unauthorized data access, modification, or disruption of services. Since netfilter is integral to Linux networking, exploitation could also affect firewall and packet filtering operations, potentially disrupting network security controls. Organizations relying on Linux servers, network appliances, or embedded devices with netfilter enabled are at risk. The vulnerability could be leveraged to bypass security controls, install persistent malware, or pivot within internal networks. Although remote exploitation is unlikely without local access, insider threats or attackers who have gained initial footholds could exploit this flaw to escalate privileges and deepen their control. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as public disclosure often leads to exploit development. The impact spans confidentiality, integrity, and availability, making it a critical concern for enterprise, cloud, and infrastructure providers.

Mitigation Recommendations

To mitigate CVE-2024-0193, organizations should: 1) Monitor for and apply official Linux kernel patches addressing this vulnerability as soon as they become available from trusted vendors or distributions. 2) Restrict assignment of the CAP_NET_ADMIN capability to only trusted and necessary users or processes, minimizing the attack surface. 3) Employ strict access controls and auditing on systems that allow local user access, especially those with network administration privileges. 4) Use kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and memory protection mechanisms to reduce exploitation likelihood. 5) Consider container or virtualization isolation to limit the impact of potential privilege escalations. 6) Regularly review and update firewall and network security configurations to detect anomalous behavior potentially related to exploitation attempts. 7) Implement comprehensive monitoring and alerting for suspicious local privilege escalation attempts. 8) Educate system administrators about the risks of granting CAP_NET_ADMIN and the importance of least privilege principles. These steps go beyond generic advice by focusing on capability restriction and proactive patch management tailored to this vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-02T10:58:11.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7a5cfba0e608b4f98d817

Added to database: 10/9/2025, 12:08:47 PM

Last enriched: 3/7/2026, 9:10:09 PM

Last updated: 3/25/2026, 5:13:36 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses