Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45752: n/a

0
High
VulnerabilityCVE-2024-45752cvecve-2024-45752
Published: Thu Sep 19 2024 (09/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-45752 is a high-severity vulnerability in logiops up to version 0. 3. 4 where an unprivileged user can exploit an unrestricted D-Bus service to configure the logid daemon, including setting malicious keyboard macros. This vulnerability enables privilege escalation with minimal user interaction, potentially allowing attackers to gain elevated system privileges. The vulnerability affects systems running logiops in default configuration and requires local access with some user interaction. No known exploits are currently observed in the wild. The vulnerability is characterized by a complex scope involving confidentiality, integrity, and availability impacts, and it is rated with a CVSS score of 8. 5. Organizations using logiops should prioritize patching or mitigating this vulnerability to prevent unauthorized privilege escalation.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:18:31 UTC

Technical Analysis

CVE-2024-45752 is a vulnerability found in logiops, a Linux utility used for configuring Logitech devices, specifically up to version 0.3.4. The issue arises because the logid daemon exposes an unrestricted D-Bus service that any unprivileged user can access. Through this service, an attacker can configure the daemon, including setting malicious keyboard macros. These macros can be leveraged to execute arbitrary commands with elevated privileges, effectively allowing privilege escalation. The vulnerability requires minimal user interaction but does require local access to the system. The CVSS 3.1 score of 8.5 reflects a high severity due to the combination of low attack complexity, local attack vector, and the potential for complete compromise of confidentiality, integrity, and availability. The vulnerability is related to CWE-269 (Improper Privilege Management), indicating that the service does not properly restrict access to privileged operations. No patches or known exploits are currently reported, but the risk remains significant due to the potential impact and ease of exploitation once local access is obtained.

Potential Impact

This vulnerability can have severe consequences for organizations using logiops on Linux systems, especially those relying on Logitech device configurations. An attacker with local access can escalate privileges to root or equivalent, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of system operations, and the ability to install persistent malware or backdoors. The integrity of system configurations and user inputs can be manipulated, and availability may be affected if the attacker disables or alters critical services. Organizations with multi-user environments or those that allow untrusted users local access are particularly at risk. The vulnerability could also be leveraged as a stepping stone for lateral movement within networks, increasing the overall risk posture.

Mitigation Recommendations

To mitigate CVE-2024-45752, organizations should first check if they are using logiops up to version 0.3.4 and assess their exposure. Since no official patch is currently available, immediate mitigation steps include restricting local user access to systems running logiops, especially limiting unprivileged users from accessing the D-Bus service used by logid. Implementing strict access controls on the D-Bus interface, such as configuring D-Bus policies to restrict which users can communicate with the logid daemon, is critical. Monitoring and auditing D-Bus activity for suspicious configuration changes can help detect exploitation attempts. Additionally, consider disabling logiops if it is not essential or replacing it with alternative software that does not expose such vulnerabilities. Organizations should stay alert for official patches or updates from the logiops maintainers and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cf1b7ef31ef0b56a5f7

Added to database: 2/25/2026, 9:43:13 PM

Last enriched: 2/26/2026, 8:18:31 AM

Last updated: 2/26/2026, 9:16:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats