Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1086: CWE-416 Use After Free in Linux Kernel

0
High
VulnerabilityCVE-2024-1086cvecve-2024-1086cwe-416
Published: Wed Jan 31 2024 (01/31/2024, 12:14:34 UTC)
Source: CVE Database V5
Vendor/Project: Linux
Product: Kernel

Description

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:05:51 UTC

Technical Analysis

CVE-2024-1086 is a use-after-free vulnerability categorized under CWE-416 affecting the Linux kernel's netfilter subsystem, specifically the nf_tables component responsible for packet filtering and firewall rules. The vulnerability stems from the nft_verdict_init() function allowing positive values as drop errors within the hook verdict structure. When the nf_hook_slow() function processes these verdicts, issuing NF_DROP with a drop error that mimics NF_ACCEPT leads to a double free condition. This memory management flaw can corrupt kernel memory, enabling a local attacker with limited privileges to escalate to higher privileges, potentially root. The vulnerability affects Linux kernel version 3.15 and likely other versions with similar code. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring local privileges and no user interaction. No public exploits are known yet, but the vulnerability's nature makes it a significant risk for systems relying on netfilter for security enforcement. The recommended mitigation is to upgrade the kernel to versions including the fix after commit f342de4e2f33e0e39165d8639387aa6c19dff660.

Potential Impact

This vulnerability allows local attackers to escalate privileges by exploiting a use-after-free flaw in the Linux kernel's netfilter nf_tables component. Successful exploitation can lead to full system compromise, allowing attackers to gain root-level access, bypass security controls, and potentially execute arbitrary code within the kernel context. This compromises confidentiality, integrity, and availability of affected systems. Systems running vulnerable Linux kernels, especially servers, cloud infrastructure, and embedded devices relying on netfilter for firewalling and packet filtering, are at risk. The impact is severe in multi-user environments or shared hosting where local access is possible. Given Linux's widespread use in enterprise, cloud, and IoT devices, the vulnerability poses a broad threat. Although no exploits are currently known in the wild, the ease of exploitation and high impact necessitate urgent remediation to prevent future attacks.

Mitigation Recommendations

1. Upgrade Linux kernels to versions including the patch after commit f342de4e2f33e0e39165d8639387aa6c19dff660 or later. 2. For environments where immediate patching is not possible, restrict local user access and enforce strict user privilege separation to limit potential attackers. 3. Monitor system logs for unusual netfilter or kernel errors that may indicate exploitation attempts. 4. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation success. 5. Use security modules like SELinux or AppArmor to enforce strict policies limiting process capabilities. 6. Regularly audit and update firewall and netfilter configurations to minimize attack surface. 7. Maintain up-to-date intrusion detection systems capable of detecting anomalous kernel behavior. 8. Coordinate with Linux distribution vendors for timely security updates and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google
Date Reserved
2024-01-30T20:04:09.704Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b0247d717aace268c8

Added to database: 10/21/2025, 7:06:24 PM

Last enriched: 2/28/2026, 8:05:51 AM

Last updated: 3/24/2026, 7:05:51 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses