CVE-2024-28085: n/a
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-28085 affects the 'wall' command in util-linux versions up to 2.40. The 'wall' utility is commonly used on Unix-like systems to send messages to all logged-in users' terminals. Typically, escape sequences from standard input are blocked to prevent terminal control code injection. However, this vulnerability arises because escape sequences passed via command-line arguments (argv) are not filtered or blocked, allowing an attacker to inject terminal control sequences into other users' terminal sessions. Since 'wall' is often installed with setgid tty permissions, it runs with elevated privileges to write to other users' terminals. An attacker with limited local privileges can exploit this to send crafted escape sequences that may manipulate terminal behavior, potentially tricking users or executing unintended commands, which could lead to account compromise in plausible scenarios. The vulnerability is classified under CWE-150 (Improper Neutralization of Input During Web Page Generation, but here related to terminal escape sequences). The CVSS v3.1 base score is 3.3, indicating low severity due to the need for local access, limited privileges, no user interaction, and no direct confidentiality impact. No public exploits are known at this time, and no patches have been linked yet, but the issue is publicly disclosed and should be addressed promptly.
Potential Impact
For European organizations, the impact of CVE-2024-28085 is primarily on the integrity of terminal sessions in multi-user environments. Attackers with local access could inject malicious escape sequences into other users' terminals, potentially leading to session hijacking, command injection, or social engineering attacks that might escalate to account takeover. While the vulnerability does not directly compromise confidentiality or availability, the ability to manipulate terminal output can undermine trust and operational security. Organizations running multi-user Linux systems, especially those using util-linux versions up to 2.40 with setgid tty permissions, are at risk. Critical infrastructure, academic institutions, and enterprises relying on shared Unix/Linux servers could see increased risk if attackers gain local access. The low CVSS score reflects limited exploitability and impact, but the potential for account takeover in certain scenarios warrants attention. The absence of known exploits suggests the threat is currently low but could increase if weaponized.
Mitigation Recommendations
To mitigate CVE-2024-28085, European organizations should: 1) Monitor vendor advisories and apply patches or updates to util-linux as soon as they become available to address this vulnerability. 2) Restrict the use of the 'wall' command to trusted users only by adjusting permissions or using access control mechanisms such as sudoers configurations to limit who can invoke 'wall'. 3) Consider removing setgid tty permissions from 'wall' if operationally feasible, reducing the risk of privilege escalation. 4) Implement strict local user account management and monitoring to detect unusual usage of 'wall' or terminal escape sequences. 5) Educate users about the risks of terminal manipulation and encourage vigilance when unexpected terminal behavior occurs. 6) Employ endpoint security solutions capable of detecting anomalous terminal activity or command injection attempts. These targeted actions go beyond generic advice by focusing on controlling access to the vulnerable utility and monitoring for exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-28085: n/a
Description
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-28085 affects the 'wall' command in util-linux versions up to 2.40. The 'wall' utility is commonly used on Unix-like systems to send messages to all logged-in users' terminals. Typically, escape sequences from standard input are blocked to prevent terminal control code injection. However, this vulnerability arises because escape sequences passed via command-line arguments (argv) are not filtered or blocked, allowing an attacker to inject terminal control sequences into other users' terminal sessions. Since 'wall' is often installed with setgid tty permissions, it runs with elevated privileges to write to other users' terminals. An attacker with limited local privileges can exploit this to send crafted escape sequences that may manipulate terminal behavior, potentially tricking users or executing unintended commands, which could lead to account compromise in plausible scenarios. The vulnerability is classified under CWE-150 (Improper Neutralization of Input During Web Page Generation, but here related to terminal escape sequences). The CVSS v3.1 base score is 3.3, indicating low severity due to the need for local access, limited privileges, no user interaction, and no direct confidentiality impact. No public exploits are known at this time, and no patches have been linked yet, but the issue is publicly disclosed and should be addressed promptly.
Potential Impact
For European organizations, the impact of CVE-2024-28085 is primarily on the integrity of terminal sessions in multi-user environments. Attackers with local access could inject malicious escape sequences into other users' terminals, potentially leading to session hijacking, command injection, or social engineering attacks that might escalate to account takeover. While the vulnerability does not directly compromise confidentiality or availability, the ability to manipulate terminal output can undermine trust and operational security. Organizations running multi-user Linux systems, especially those using util-linux versions up to 2.40 with setgid tty permissions, are at risk. Critical infrastructure, academic institutions, and enterprises relying on shared Unix/Linux servers could see increased risk if attackers gain local access. The low CVSS score reflects limited exploitability and impact, but the potential for account takeover in certain scenarios warrants attention. The absence of known exploits suggests the threat is currently low but could increase if weaponized.
Mitigation Recommendations
To mitigate CVE-2024-28085, European organizations should: 1) Monitor vendor advisories and apply patches or updates to util-linux as soon as they become available to address this vulnerability. 2) Restrict the use of the 'wall' command to trusted users only by adjusting permissions or using access control mechanisms such as sudoers configurations to limit who can invoke 'wall'. 3) Consider removing setgid tty permissions from 'wall' if operationally feasible, reducing the risk of privilege escalation. 4) Implement strict local user account management and monitoring to detect unusual usage of 'wall' or terminal escape sequences. 5) Educate users about the risks of terminal manipulation and encourage vigilance when unexpected terminal behavior occurs. 6) Employ endpoint security solutions capable of detecting anomalous terminal activity or command injection attempts. These targeted actions go beyond generic advice by focusing on controlling access to the vulnerable utility and monitoring for exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47636d939959c8022fb5
Added to database: 11/4/2025, 6:35:15 PM
Last enriched: 11/4/2025, 6:46:08 PM
Last updated: 11/4/2025, 9:34:28 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2749: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Kentico Xperience
HighCVE-2024-52279: CWE-20 Improper Input Validation in Apache Software Foundation Apache Zeppelin
HighCVE-2024-51775: CWE-1385 Missing Origin Validation in WebSockets in Apache Software Foundation Apache Zeppelin
HighCVE-2024-48988: CWE-564 SQL Injection in Apache Software Foundation Apache StreamPark
HighCVE-2024-43166: CWE-276 Incorrect Default Permissions in Apache Software Foundation Apache DolphinScheduler
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.