Skip to main content

CVE-2024-11857: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Realtek Bluetooth HCI Adaptor

High
VulnerabilityCVE-2024-11857cvecve-2024-11857cwe-59
Published: Mon Jun 02 2025 (06/02/2025, 03:24:16 UTC)
Source: CVE Database V5
Vendor/Project: Realtek
Product: Bluetooth HCI Adaptor

Description

Bluetooth HCI Adaptor from Realtek has a Link Following vulnerability. Local attackers with regular privileges can create a symbolic link with the same name as a specific file, causing the product to delete arbitrary files pointed to by the link. Subsequently, attackers can leverage arbitrary file deletion to privilege escalation.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:57:37 UTC

Technical Analysis

CVE-2024-11857 is a high-severity vulnerability affecting the Realtek Bluetooth HCI Adaptor, categorized under CWE-59: Improper Link Resolution Before File Access ('Link Following'). This vulnerability arises because the Bluetooth HCI Adaptor improperly handles symbolic links when performing file deletion operations. Specifically, a local attacker with standard user privileges can create a symbolic link that mimics the name of a target file the adaptor intends to delete. When the adaptor executes the deletion, it follows the symbolic link and deletes the file pointed to by the link rather than the intended file. This behavior enables attackers to delete arbitrary files on the system. The consequence of arbitrary file deletion can be leveraged for privilege escalation, as critical system or application files may be removed or corrupted, potentially allowing the attacker to gain higher privileges or disrupt system integrity. The vulnerability does not require user interaction but does require local access with limited privileges. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 2, 2025, and was reserved in late 2024. The core technical issue is the failure to securely resolve symbolic links before file deletion, a classic link following flaw that can be exploited in multi-user environments where local users have access to create symbolic links in locations monitored or used by the Bluetooth adaptor software.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Realtek Bluetooth HCI Adaptors are deployed on endpoints such as laptops, desktops, or embedded devices. The ability for a local attacker to delete arbitrary files can lead to system instability, denial of service, or privilege escalation, potentially allowing attackers to compromise sensitive data or gain administrative control. This is particularly concerning in sectors with strict data protection regulations like GDPR, where unauthorized access or data loss can result in severe legal and financial penalties. Additionally, organizations relying heavily on Bluetooth connectivity for peripherals or IoT devices may face operational disruptions. The vulnerability's local attack vector means insider threats or compromised user accounts could exploit this flaw. Given the high confidentiality, integrity, and availability impacts, critical infrastructure, financial institutions, healthcare providers, and government agencies in Europe should be especially vigilant.

Mitigation Recommendations

To mitigate CVE-2024-11857, European organizations should: 1) Monitor vendor communications closely for official patches or firmware updates from Realtek and apply them promptly once available. 2) Implement strict access controls and monitoring on systems with Realtek Bluetooth HCI Adaptors to limit local user capabilities to create symbolic links in sensitive directories. 3) Employ endpoint protection solutions that can detect and block suspicious symbolic link creation or unauthorized file deletions. 4) Conduct regular audits of file system integrity on critical systems to detect unexpected deletions or modifications. 5) Use application whitelisting and privilege management to restrict the execution of unauthorized code that could exploit this vulnerability. 6) Educate users about the risks of local exploitation and enforce the principle of least privilege to minimize the number of users with local access. 7) Consider isolating or segmenting devices with vulnerable adaptors to reduce the risk of lateral movement in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2024-11-27T06:26:29.166Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683d1df1182aa0cae231b0e0

Added to database: 6/2/2025, 3:43:45 AM

Last enriched: 7/9/2025, 12:57:37 PM

Last updated: 7/30/2025, 4:11:41 PM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats