CVE-2024-50125: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list.
AI Analysis
Technical Summary
CVE-2024-50125 is a high-severity use-after-free (UAF) vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically affecting the SCO (Synchronous Connection-Oriented) socket timeout handling. The vulnerability arises because the kernel code does not properly verify the validity of the socket pointer (conn->sk) while waiting for the sco_conn_lock. During this wait, the socket may have been unlinked or freed, leading to a use-after-free condition when the kernel later attempts to access it. This flaw is categorized under CWE-416 (Use After Free), which can cause memory corruption, potentially allowing an attacker to execute arbitrary code with kernel privileges or cause a denial of service by crashing the system. The vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating a broad impact across various distributions that have not yet applied the patch. The CVSS v3.1 base score is 7.8, reflecting high severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access with low complexity, low privileges, no user interaction, and can compromise confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant due to the kernel-level nature of the flaw and the critical role of Bluetooth in many systems.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on Linux-based systems in critical infrastructure, enterprise servers, and embedded devices that utilize Bluetooth connectivity. Exploitation could lead to privilege escalation, allowing attackers to gain kernel-level control, which may result in data breaches, system manipulation, or service disruption. Industries such as telecommunications, manufacturing, healthcare, and finance, which often deploy Linux servers and IoT devices with Bluetooth capabilities, could face operational interruptions or compromise of sensitive data. The vulnerability's requirement for local access somewhat limits remote exploitation but does not eliminate risk, as attackers could leverage social engineering or insider threats to gain initial footholds. Additionally, the lack of user interaction required for exploitation increases the threat level. The potential for denial of service or arbitrary code execution could disrupt business continuity and damage organizational reputation.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions as soon as vendor updates become available. Given the kernel-level impact, applying official security patches from Linux distribution maintainers is critical. Until patches are deployed, organizations should consider disabling Bluetooth functionality on systems where it is not essential, especially on servers and critical infrastructure devices. Implement strict access controls to limit local user privileges and restrict physical and remote access to trusted personnel only. Employ host-based intrusion detection systems (HIDS) to monitor unusual kernel or Bluetooth subsystem activity. Regularly audit systems for outdated kernel versions and maintain an inventory of devices with Bluetooth capabilities. For embedded and IoT devices, coordinate with vendors to ensure timely firmware updates. Additionally, enhance endpoint security policies to detect and prevent lateral movement that could facilitate local exploitation. Network segmentation can further reduce the risk of an attacker gaining local access to vulnerable systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-50125: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list.
AI-Powered Analysis
Technical Analysis
CVE-2024-50125 is a high-severity use-after-free (UAF) vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically affecting the SCO (Synchronous Connection-Oriented) socket timeout handling. The vulnerability arises because the kernel code does not properly verify the validity of the socket pointer (conn->sk) while waiting for the sco_conn_lock. During this wait, the socket may have been unlinked or freed, leading to a use-after-free condition when the kernel later attempts to access it. This flaw is categorized under CWE-416 (Use After Free), which can cause memory corruption, potentially allowing an attacker to execute arbitrary code with kernel privileges or cause a denial of service by crashing the system. The vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating a broad impact across various distributions that have not yet applied the patch. The CVSS v3.1 base score is 7.8, reflecting high severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access with low complexity, low privileges, no user interaction, and can compromise confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential impact is significant due to the kernel-level nature of the flaw and the critical role of Bluetooth in many systems.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on Linux-based systems in critical infrastructure, enterprise servers, and embedded devices that utilize Bluetooth connectivity. Exploitation could lead to privilege escalation, allowing attackers to gain kernel-level control, which may result in data breaches, system manipulation, or service disruption. Industries such as telecommunications, manufacturing, healthcare, and finance, which often deploy Linux servers and IoT devices with Bluetooth capabilities, could face operational interruptions or compromise of sensitive data. The vulnerability's requirement for local access somewhat limits remote exploitation but does not eliminate risk, as attackers could leverage social engineering or insider threats to gain initial footholds. Additionally, the lack of user interaction required for exploitation increases the threat level. The potential for denial of service or arbitrary code execution could disrupt business continuity and damage organizational reputation.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions as soon as vendor updates become available. Given the kernel-level impact, applying official security patches from Linux distribution maintainers is critical. Until patches are deployed, organizations should consider disabling Bluetooth functionality on systems where it is not essential, especially on servers and critical infrastructure devices. Implement strict access controls to limit local user privileges and restrict physical and remote access to trusted personnel only. Employ host-based intrusion detection systems (HIDS) to monitor unusual kernel or Bluetooth subsystem activity. Regularly audit systems for outdated kernel versions and maintain an inventory of devices with Bluetooth capabilities. For embedded and IoT devices, coordinate with vendors to ensure timely firmware updates. Additionally, enhance endpoint security policies to detect and prevent lateral movement that could facilitate local exploitation. Network segmentation can further reduce the risk of an attacker gaining local access to vulnerable systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-10-21T19:36:19.954Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdcf41
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 7/3/2025, 2:12:36 PM
Last updated: 8/14/2025, 4:22:03 PM
Views: 15
Related Threats
CVE-2025-57800: CWE-523: Unprotected Transport of Credentials in advplyr audiobookshelf
HighCVE-2025-55637: n/a
HighCVE-2025-55634: n/a
HighCVE-2025-55631: n/a
HighCVE-2025-55630: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.