Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1488: Incorrect Default Permissions

0
High
VulnerabilityCVE-2024-1488cvecve-2024-1488
Published: Thu Feb 15 2024 (02/15/2024, 05:04:13 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:33:27 UTC

Technical Analysis

CVE-2024-1488 is a vulnerability identified in Unbound version 1.16.2 stemming from incorrect default permissions on its runtime configuration interface. Unbound is a widely used DNS resolver that runs as a service, typically under a dedicated unbound group. The vulnerability allows any process, even those not belonging to the unbound group, to connect to the Unbound service via localhost on TCP port 8953 and modify its runtime configuration. This misconfiguration means that an unprivileged attacker with local access can alter critical settings such as forwarders, which are DNS servers to which queries are forwarded. By manipulating forwarders, an attacker can intercept or monitor DNS queries, compromising confidentiality. Additionally, they can disrupt DNS resolution, impacting availability. The vulnerability does not require authentication or user interaction, making it easier to exploit once local access is obtained. The CVSS 3.1 base score is 8.0, reflecting high severity due to the combination of local attack vector, low complexity, no privileges required, and significant impact on integrity and availability. Although no known exploits have been reported in the wild, the potential for misuse in environments where Unbound is deployed is significant. The flaw highlights the importance of secure default permissions and access controls on local management interfaces of critical network services.

Potential Impact

This vulnerability can have severe consequences for organizations relying on Unbound as their DNS resolver. By allowing unprivileged local users to modify runtime configurations, attackers can redirect DNS queries to malicious forwarders, enabling DNS query interception and data leakage. This compromises the confidentiality of internal network communications and can facilitate further attacks such as phishing or man-in-the-middle. Altering DNS settings can also disrupt name resolution, causing denial of service for network resources and applications dependent on DNS. In environments where Unbound is used in critical infrastructure, enterprise networks, or security-sensitive contexts, this can lead to significant operational disruptions and data breaches. The ease of exploitation without authentication increases the risk, especially on multi-user systems or those exposed to untrusted local users or processes. Organizations with automated systems or containerized environments running Unbound may also be at risk if local access controls are insufficient.

Mitigation Recommendations

To mitigate CVE-2024-1488, organizations should immediately upgrade Unbound to a patched version once available. In the interim, restrict access to localhost port 8953 using local firewall rules or socket permissions to ensure only trusted processes or users in the unbound group can connect. Review and tighten file system permissions on Unbound configuration and runtime files to prevent unauthorized modifications. Employ system-level access controls such as SELinux or AppArmor profiles to confine Unbound and its management interfaces. Monitor local network connections to port 8953 for unusual activity. For multi-user systems, limit local user privileges and isolate critical services using containerization or virtualization. Regularly audit Unbound configurations and logs for unauthorized changes. Finally, incorporate this vulnerability into incident response plans to quickly detect and remediate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-02-14T12:47:25.283Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69135a44b36faa5b6c0e5fe3

Added to database: 11/11/2025, 3:46:12 PM

Last enriched: 2/28/2026, 8:33:27 AM

Last updated: 3/24/2026, 7:33:27 PM

Views: 160

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses