Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38394: n/a

0
Medium
VulnerabilityCVE-2024-38394cvecve-2024-38394
Published: Sat Jun 15 2024 (06/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE."

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:01:30 UTC

Technical Analysis

CVE-2024-38394 identifies a vulnerability caused by inconsistent interpretation of USB authorization policies between the GNOME Settings Daemon (GSD) through version 46.0 and the Linux kernel's device matching logic. The GNOME Settings Daemon manages user session settings, including USB device authorization, while the Linux kernel enforces device-level access controls. Due to mismatches in how these two components interpret USB authorization, an attacker with physical proximity can connect a malicious USB device that bypasses intended authorization checks. This allows the attacker to trigger unintended kernel USB functionalities such as loading device-specific kernel modules or accessing filesystem implementations tied to USB devices. Exploitation does not require user privileges or interaction, only physical access to the target machine's USB ports. The vulnerability is rated medium severity with a CVSS 3.1 score of 4.3, reflecting local attack vector, low complexity, no privileges required, and no user interaction needed. The impact includes limited confidentiality, integrity, and availability risks, primarily through unauthorized kernel-level USB operations. The GSD supplier notes that mitigation would be considered a new feature rather than a direct patch for this CVE, indicating that no immediate fix is currently available in GSD itself. No known exploits have been reported in the wild, but the vulnerability poses a risk in environments where physical access cannot be fully controlled. Systems running GNOME with affected GSD versions and Linux kernels are vulnerable, particularly desktops and laptops in enterprise or public settings.

Potential Impact

The vulnerability allows an attacker with physical access to a Linux system running GNOME Settings Daemon through version 46.0 to bypass USB authorization policies and access unintended kernel USB functionalities. This can lead to unauthorized loading of USB device-specific kernel modules or access to USB filesystem implementations, potentially enabling privilege escalation, data leakage, or system instability. While the impact on confidentiality, integrity, and availability is limited compared to remote exploits, the risk is significant in environments where physical access is possible, such as shared workspaces, public kiosks, or untrusted physical locations. Organizations relying on Linux desktops or laptops with GNOME in sensitive environments may face increased risk of targeted attacks or insider threats exploiting this vulnerability. The lack of user interaction or privileges required lowers the barrier for exploitation once physical access is obtained. However, the absence of known exploits in the wild and the medium CVSS score suggest moderate urgency. Still, the vulnerability could be leveraged as part of a multi-stage attack chain to gain deeper system access or persistence.

Mitigation Recommendations

To mitigate CVE-2024-38394, organizations should implement strict physical security controls to prevent unauthorized access to USB ports on Linux systems running GNOME. This includes using port locks, USB device whitelisting, or disabling unused USB ports via BIOS or kernel parameters. Administrators should monitor for updates from GNOME Settings Daemon and Linux kernel maintainers addressing this issue and apply patches promptly once available. Until official patches are released, consider disabling automatic loading of USB device-specific kernel modules or restricting USB filesystem mounts through udev rules or systemd configurations. Employ endpoint security solutions that can detect anomalous USB device behavior. Additionally, educating users about the risks of connecting untrusted USB devices and enforcing policies against unauthorized hardware can reduce exploitation likelihood. For high-security environments, consider using hardware-based USB authorization solutions or disabling USB ports entirely where feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c79b7ef31ef0b564c36

Added to database: 2/25/2026, 9:41:13 PM

Last enriched: 2/28/2026, 4:01:30 AM

Last updated: 4/12/2026, 3:41:03 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses