CVE-2024-36041: n/a
KSmserver in KDE Plasma Workspace (aka plasma-workspace) before 5.27.11.1 and 6.x before 6.0.5.1 allows connections via ICE based purely on the host, i.e., all local connections are accepted. This allows another user on the same machine to gain access to the session manager, e.g., use the session-restore feature to execute arbitrary code as the victim (on the next boot) via earlier use of the /tmp directory.
AI Analysis
Technical Summary
CVE-2024-36041 is a vulnerability in KSmserver, the session manager component of KDE Plasma Workspace, identified in versions prior to 5.27.11.1 and 6.x before 6.0.5.1. The flaw arises because KSmserver accepts ICE (Inter-Client Exchange) protocol connections based solely on the host, effectively trusting all local connections without further authentication. This design allows any local user on the same machine to connect to the session manager. Exploiting this, an attacker can manipulate the session-restore feature by placing crafted files in the /tmp directory, which the session manager processes on the next user login or system boot. This leads to arbitrary code execution within the context of the victim user session. The vulnerability impacts confidentiality (unauthorized access to session data), integrity (execution of unauthorized code), and availability (potential session disruption). The CVSS v3.1 score is 7.3 (high), reflecting the local attack vector, low attack complexity, required privileges (local user), and user interaction (victim login). No public exploits have been reported yet, but the vulnerability poses a significant risk in multi-user Linux environments where KDE Plasma is deployed. The underlying CWE-613 indicates improper session expiration or invalidation, which in this case manifests as overly permissive connection acceptance and session restore handling.
Potential Impact
For European organizations, especially those using KDE Plasma in multi-user environments such as shared workstations, developer machines, or educational institutions, this vulnerability can lead to unauthorized local privilege escalation and session compromise. Attackers with local access can execute arbitrary code as another user, potentially accessing sensitive data, installing persistent malware, or disrupting user sessions. This is particularly critical in environments where users have different privilege levels or where sensitive operations occur on shared machines. The impact extends to confidentiality breaches, integrity violations through code execution, and availability issues due to session disruption. Organizations relying on KDE Plasma for desktop environments in government, research, or enterprise sectors may face increased risk, especially if patching is delayed or local user access controls are weak.
Mitigation Recommendations
1. Upgrade KDE Plasma Workspace to version 5.27.11.1 or later, or 6.0.5.1 or later, where this vulnerability is patched. 2. Restrict local user access on multi-user systems to trusted personnel only, minimizing the risk of malicious local actors. 3. Implement strict permissions and monitoring on the /tmp directory to detect and prevent unauthorized file manipulations related to session restore. 4. Use Linux security modules (e.g., SELinux, AppArmor) to enforce access controls on session manager processes and temporary directories. 5. Educate users about the risks of local privilege escalation and encourage reporting of suspicious activity. 6. Consider isolating critical user sessions or using containerization to limit the impact of local exploits. 7. Regularly audit and monitor system logs for unusual ICE connection attempts or session manager anomalies.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2024-36041: n/a
Description
KSmserver in KDE Plasma Workspace (aka plasma-workspace) before 5.27.11.1 and 6.x before 6.0.5.1 allows connections via ICE based purely on the host, i.e., all local connections are accepted. This allows another user on the same machine to gain access to the session manager, e.g., use the session-restore feature to execute arbitrary code as the victim (on the next boot) via earlier use of the /tmp directory.
AI-Powered Analysis
Technical Analysis
CVE-2024-36041 is a vulnerability in KSmserver, the session manager component of KDE Plasma Workspace, identified in versions prior to 5.27.11.1 and 6.x before 6.0.5.1. The flaw arises because KSmserver accepts ICE (Inter-Client Exchange) protocol connections based solely on the host, effectively trusting all local connections without further authentication. This design allows any local user on the same machine to connect to the session manager. Exploiting this, an attacker can manipulate the session-restore feature by placing crafted files in the /tmp directory, which the session manager processes on the next user login or system boot. This leads to arbitrary code execution within the context of the victim user session. The vulnerability impacts confidentiality (unauthorized access to session data), integrity (execution of unauthorized code), and availability (potential session disruption). The CVSS v3.1 score is 7.3 (high), reflecting the local attack vector, low attack complexity, required privileges (local user), and user interaction (victim login). No public exploits have been reported yet, but the vulnerability poses a significant risk in multi-user Linux environments where KDE Plasma is deployed. The underlying CWE-613 indicates improper session expiration or invalidation, which in this case manifests as overly permissive connection acceptance and session restore handling.
Potential Impact
For European organizations, especially those using KDE Plasma in multi-user environments such as shared workstations, developer machines, or educational institutions, this vulnerability can lead to unauthorized local privilege escalation and session compromise. Attackers with local access can execute arbitrary code as another user, potentially accessing sensitive data, installing persistent malware, or disrupting user sessions. This is particularly critical in environments where users have different privilege levels or where sensitive operations occur on shared machines. The impact extends to confidentiality breaches, integrity violations through code execution, and availability issues due to session disruption. Organizations relying on KDE Plasma for desktop environments in government, research, or enterprise sectors may face increased risk, especially if patching is delayed or local user access controls are weak.
Mitigation Recommendations
1. Upgrade KDE Plasma Workspace to version 5.27.11.1 or later, or 6.0.5.1 or later, where this vulnerability is patched. 2. Restrict local user access on multi-user systems to trusted personnel only, minimizing the risk of malicious local actors. 3. Implement strict permissions and monitoring on the /tmp directory to detect and prevent unauthorized file manipulations related to session restore. 4. Use Linux security modules (e.g., SELinux, AppArmor) to enforce access controls on session manager processes and temporary directories. 5. Educate users about the risks of local privilege escalation and encourage reporting of suspicious activity. 6. Consider isolating critical user sessions or using containerization to limit the impact of local exploits. 7. Regularly audit and monitor system logs for unusual ICE connection attempts or session manager anomalies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a3b50ff58c9332ff073e4
Added to database: 11/4/2025, 5:43:44 PM
Last enriched: 11/11/2025, 6:30:35 PM
Last updated: 12/15/2025, 1:50:05 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66388: CWE-201 Insertion of Sensitive Information Into Sent Data in Apache Software Foundation Apache Airflow
UnknownCVE-2025-11670: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Zohocorp ManageEngine ADManager Plus
MediumCVE-2025-37731: CWE-287 Improper Authentication in Elastic Elasticsearch
MediumCVE-2025-14714: CWE-288 Authentication Bypass Using an Alternate Path or Channel in The Document Foundation LibreOffice
LowCVE-2025-37732: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Elastic Kibana
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.