Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54192: n/a

0
Medium
VulnerabilityCVE-2024-54192cvecve-2024-54192
Published: Tue Feb 10 2026 (02/10/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue inTcpreplay v4.5.1 allows a local attacker to cause a denial of service via a crafted file to the tcpedit_dlt_getplugin function at src/tcpedit/plugins/dlt_utils.c.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:30:52 UTC

Technical Analysis

CVE-2024-54192 is a vulnerability identified in Tcpreplay version 4.5.1, a widely used open-source tool for replaying network traffic for testing and analysis purposes. The vulnerability exists in the tcpedit_dlt_getplugin function located in the source file src/tcpedit/plugins/dlt_utils.c. Specifically, when processing a crafted input file, the function mishandles data leading to a denial of service condition. This is classified under CWE-400, indicating a resource exhaustion or uncontrolled resource consumption issue. The attack vector requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but does require user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity compromise. The vulnerability can cause the application to crash or become unresponsive, disrupting network testing workflows. No public exploits or patches are currently available, which means organizations must rely on mitigating controls until an official fix is released. The vulnerability was published on February 10, 2026, and is assigned a CVSS v3.1 score of 5.0, reflecting its medium severity. The lack of remote exploitation capability limits the attack surface primarily to internal users or compromised systems.

Potential Impact

For European organizations, the primary impact of CVE-2024-54192 is the potential denial of service of Tcpreplay instances used in network testing, forensic analysis, or security research. Disruption of these tools can delay incident response, vulnerability assessments, and network troubleshooting activities, potentially increasing exposure to other threats. Organizations relying on Tcpreplay in critical infrastructure sectors such as telecommunications, finance, or government may experience operational delays or reduced visibility into network traffic behaviors. Since exploitation requires local access and user interaction, insider threats or compromised endpoints pose the greatest risk. The vulnerability does not expose sensitive data or allow privilege escalation, but availability impacts can cascade if network testing is integral to security operations. The absence of known exploits reduces immediate risk, but the medium severity score and the tool’s role in security workflows warrant proactive mitigation.

Mitigation Recommendations

1. Restrict local access to systems running Tcpreplay to trusted users only, employing strict access controls and user authentication. 2. Monitor system and application logs for abnormal crashes or resource usage patterns indicative of exploitation attempts. 3. Employ endpoint protection solutions to detect and prevent execution of crafted files targeting Tcpreplay. 4. Educate users about the risks of opening or processing untrusted files with Tcpreplay to reduce inadvertent triggering of the vulnerability. 5. Isolate Tcpreplay environments from production systems to contain potential denial of service impacts. 6. Track vendor communications and apply patches or updates promptly once available. 7. Consider implementing application whitelisting and sandboxing for Tcpreplay to limit the impact of malicious inputs. 8. Conduct regular security assessments of network testing tools and their configurations to identify and remediate weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b92154b57a58fa127f945

Added to database: 2/10/2026, 8:16:21 PM

Last enriched: 2/10/2026, 8:30:52 PM

Last updated: 2/11/2026, 9:24:17 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats