Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-52336: Improper Privilege Management

0
High
VulnerabilityCVE-2024-52336cvecve-2024-52336
Published: Tue Nov 26 2024 (11/26/2024, 15:21:13 UTC)
Source: CVE

Description

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:02:22 UTC

Technical Analysis

CVE-2024-52336 is a vulnerability in the Tuned package version 2.23.0 that allows local privilege escalation through improper privilege management of the D-Bus interface. Specifically, the instance_create() function can be invoked by any locally logged-in user without authentication, permitting them to pass arbitrary scripts via the script_pre or script_post options. These scripts, executed by Tuned with root privileges, enable attackers to run arbitrary code as root, effectively escalating their privileges from a non-privileged user to full system administrator. The vulnerability exploits the lack of authentication and insufficient access controls on the D-Bus method, combined with the ability to specify absolute paths to executable scripts. This flaw affects Linux systems where Tuned is installed and running, particularly those using version 2.23.0. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability poses a significant risk due to the potential for complete system compromise. The vulnerability was published on November 26, 2024, and is tracked by Red Hat and CISA. Mitigation involves patching the Tuned package once updates are available and restricting local user access to the D-Bus interface. Monitoring for unusual D-Bus calls and script executions can also help detect exploitation attempts.

Potential Impact

The vulnerability allows local non-privileged users to execute arbitrary scripts with root privileges, leading to full system compromise. This can result in unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, and disruption of system availability. Organizations relying on Linux systems with the affected Tuned version are at risk of privilege escalation attacks that bypass normal security controls. The impact extends to confidentiality, integrity, and availability, making it a critical concern for servers, workstations, and any systems where local user accounts exist. Attackers gaining root access can pivot to other systems, exfiltrate data, or disrupt operations. The lack of required user interaction and low complexity of exploitation increase the likelihood of successful attacks in environments where local access is possible. This vulnerability is particularly dangerous in multi-user environments, shared hosting, or systems with weak local access controls.

Mitigation Recommendations

1. Apply patches or updates to the Tuned package as soon as they become available from the vendor or distribution maintainers. 2. Restrict local user access to systems running the affected Tuned version, limiting login capabilities to trusted users only. 3. Implement strict access controls on the D-Bus interface, using policies to restrict which users can invoke instance_create() or other sensitive methods. 4. Monitor D-Bus activity and system logs for unusual calls to instance_create() or execution of scripts via script_pre or script_post options. 5. Use mandatory access control frameworks like SELinux or AppArmor to confine the Tuned service and limit its ability to execute arbitrary scripts. 6. Regularly audit local user accounts and remove or disable unnecessary accounts to reduce the attack surface. 7. Employ endpoint detection and response (EDR) tools to detect suspicious script executions or privilege escalations. 8. Educate system administrators about the risks of local privilege escalation and the importance of timely patching and access control.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-11-08T13:09:39.004Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d31604d7c5ea9f4b3f283

Added to database: 5/21/2025, 1:50:24 AM

Last enriched: 2/28/2026, 3:02:22 AM

Last updated: 3/24/2026, 9:17:12 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses