Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28085: n/a

0
Low
VulnerabilityCVE-2024-28085cvecve-2024-28085
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:46:08 UTC

Technical Analysis

The vulnerability identified as CVE-2024-28085 affects the 'wall' command in util-linux versions up to 2.40. The 'wall' utility is commonly used on Unix-like systems to send messages to all logged-in users' terminals. Typically, escape sequences from standard input are blocked to prevent terminal control code injection. However, this vulnerability arises because escape sequences passed via command-line arguments (argv) are not filtered or blocked, allowing an attacker to inject terminal control sequences into other users' terminal sessions. Since 'wall' is often installed with setgid tty permissions, it runs with elevated privileges to write to other users' terminals. An attacker with limited local privileges can exploit this to send crafted escape sequences that may manipulate terminal behavior, potentially tricking users or executing unintended commands, which could lead to account compromise in plausible scenarios. The vulnerability is classified under CWE-150 (Improper Neutralization of Input During Web Page Generation, but here related to terminal escape sequences). The CVSS v3.1 base score is 3.3, indicating low severity due to the need for local access, limited privileges, no user interaction, and no direct confidentiality impact. No public exploits are known at this time, and no patches have been linked yet, but the issue is publicly disclosed and should be addressed promptly.

Potential Impact

For European organizations, the impact of CVE-2024-28085 is primarily on the integrity of terminal sessions in multi-user environments. Attackers with local access could inject malicious escape sequences into other users' terminals, potentially leading to session hijacking, command injection, or social engineering attacks that might escalate to account takeover. While the vulnerability does not directly compromise confidentiality or availability, the ability to manipulate terminal output can undermine trust and operational security. Organizations running multi-user Linux systems, especially those using util-linux versions up to 2.40 with setgid tty permissions, are at risk. Critical infrastructure, academic institutions, and enterprises relying on shared Unix/Linux servers could see increased risk if attackers gain local access. The low CVSS score reflects limited exploitability and impact, but the potential for account takeover in certain scenarios warrants attention. The absence of known exploits suggests the threat is currently low but could increase if weaponized.

Mitigation Recommendations

To mitigate CVE-2024-28085, European organizations should: 1) Monitor vendor advisories and apply patches or updates to util-linux as soon as they become available to address this vulnerability. 2) Restrict the use of the 'wall' command to trusted users only by adjusting permissions or using access control mechanisms such as sudoers configurations to limit who can invoke 'wall'. 3) Consider removing setgid tty permissions from 'wall' if operationally feasible, reducing the risk of privilege escalation. 4) Implement strict local user account management and monitoring to detect unusual usage of 'wall' or terminal escape sequences. 5) Educate users about the risks of terminal manipulation and encourage vigilance when unexpected terminal behavior occurs. 6) Employ endpoint security solutions capable of detecting anomalous terminal activity or command injection attempts. These targeted actions go beyond generic advice by focusing on controlling access to the vulnerable utility and monitoring for exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-03-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47636d939959c8022fb5

Added to database: 11/4/2025, 6:35:15 PM

Last enriched: 11/4/2025, 6:46:08 PM

Last updated: 11/4/2025, 9:34:28 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats