Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5148: Exposure of Data Element to Wrong Session

0
High
VulnerabilityCVE-2024-5148cvecve-2024-5148
Published: Mon Sep 02 2024 (09/02/2024, 11:03:18 UTC)
Source: CVE Database V5

Description

A flaw was found in the gnome-remote-desktop package. The gnome-remote-desktop system daemon performs inadequate validation of session agents using D-Bus methods related to transitioning a client connection from the login screen to the user session. As a result, the system RDP TLS certificate and key can be exposed to unauthorized users. This flaw allows a malicious user on the system to take control of the RDP client connection during the login screen-to-user session transition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:33:49 UTC

Technical Analysis

CVE-2024-5148 is a vulnerability identified in the gnome-remote-desktop package, specifically in the system daemon responsible for managing remote desktop sessions. The flaw arises from insufficient validation of session agents when handling D-Bus method calls related to transitioning a client connection from the login screen to the authenticated user session. This improper validation allows a malicious local user to intercept or take control of the RDP client connection during this transition phase. Critically, the attacker can gain access to the system's RDP TLS certificate and private key, which are intended to secure remote desktop communications. Exposure of these cryptographic credentials compromises the confidentiality of RDP sessions, potentially allowing an attacker to decrypt or impersonate legitimate remote desktop connections. The vulnerability affects version 46.alpha of gnome-remote-desktop and does not require any privileges or user interaction to exploit, increasing its risk profile. The CVSS 3.1 base score is 7.5, reflecting high severity primarily due to the confidentiality impact and ease of exploitation over the network without authentication. No known public exploits have been reported yet, but the vulnerability poses a significant risk to systems relying on GNOME remote desktop services for secure remote access.

Potential Impact

The primary impact of CVE-2024-5148 is the unauthorized disclosure of the system's RDP TLS certificate and private key, which undermines the confidentiality of remote desktop sessions. Attackers who exploit this vulnerability can potentially intercept, decrypt, or hijack RDP connections, leading to unauthorized access to user sessions or sensitive data transmitted over the remote desktop protocol. This can facilitate further lateral movement within an organization’s network or enable privilege escalation if attackers gain control of authenticated sessions. Since the vulnerability does not affect integrity or availability directly, the main concern is data exposure and session compromise. Organizations relying on GNOME remote desktop for secure remote access, especially in environments where sensitive or regulated data is accessed remotely, face increased risk of data breaches and unauthorized access. The ease of exploitation without authentication or user interaction broadens the scope of affected systems, increasing the potential attack surface.

Mitigation Recommendations

To mitigate CVE-2024-5148, organizations should immediately update the gnome-remote-desktop package to a patched version once available, as this is the most effective remediation. Until patches are applied, restrict local user access to systems running vulnerable versions to trusted personnel only, minimizing the risk of malicious local exploitation. Implement strict access controls on D-Bus interfaces related to session management to prevent unauthorized session agent manipulation. Monitor system logs for unusual D-Bus activity or unexpected session transitions that could indicate exploitation attempts. Consider disabling remote desktop access at the login screen if feasible, or restrict RDP usage to trusted networks and VPNs to reduce exposure. Additionally, rotate RDP TLS certificates and keys after patching to invalidate any potentially compromised credentials. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior associated with session hijacking or certificate theft. Finally, educate system administrators about the vulnerability and encourage vigilance for suspicious activity related to remote desktop sessions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-05-20T18:16:45.718Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f6f9228b41f27b4347591

Added to database: 11/20/2025, 7:44:18 PM

Last enriched: 2/28/2026, 3:33:49 AM

Last updated: 3/25/2026, 12:15:03 AM

Views: 149

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses