Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5564: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

0
High
VulnerabilityCVE-2024-5564cvecve-2024-5564
Published: Fri May 31 2024 (05/31/2024, 18:31:47 UTC)
Source: CVE Database V5

Description

A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.

AI-Powered Analysis

AILast updated: 11/20/2025, 07:51:45 UTC

Technical Analysis

CVE-2024-5564 is a classic buffer overflow vulnerability identified in libndp, a library used by NetworkManager to handle IPv6 Neighbor Discovery Protocol (NDP) messages. The flaw occurs due to insufficient validation of the route length field in IPv6 router advertisement packets. When a malformed packet with an incorrect route length is processed, it causes a buffer overflow, potentially allowing an attacker to overwrite memory and execute arbitrary code. The vulnerability affects NetworkManager version 1.0 and requires no privileges or user interaction to exploit, though the attack complexity is high due to the need to craft specific malformed IPv6 packets. The CVSS v3.1 score is 8.1, reflecting high impact on confidentiality, integrity, and availability, as exploitation could lead to remote code execution or denial of service. The vulnerability is remote network exploitable (AV:N), with no privileges required (PR:N) and no user interaction (UI:N). Despite the severity, no known exploits have been reported in the wild as of the publication date. This vulnerability is particularly concerning for environments that rely on IPv6 and use NetworkManager for network configuration, as it could allow attackers to compromise affected systems remotely by sending malicious router advertisements.

Potential Impact

For European organizations, the impact of CVE-2024-5564 can be significant, especially for those operating IPv6-enabled networks and using NetworkManager 1.0. Successful exploitation could lead to remote code execution, allowing attackers to gain control over affected systems, exfiltrate sensitive data, disrupt network services, or pivot within internal networks. Critical infrastructure sectors such as telecommunications, energy, finance, and government agencies that depend on Linux-based systems and NetworkManager are at heightened risk. The vulnerability threatens the confidentiality, integrity, and availability of systems, potentially causing operational disruptions and data breaches. Given the increasing adoption of IPv6 in Europe, the attack surface is expanding, making timely mitigation essential to prevent exploitation. The lack of known exploits currently provides a window for proactive defense, but the high severity score indicates that attackers may develop exploits soon.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade NetworkManager to a patched version beyond 1.0 once available from trusted vendors or distributions. 2. Network filtering: Implement IPv6 packet filtering on network perimeters and internal segmentation to block malformed router advertisement packets or restrict RA messages to trusted devices only. 3. Disable IPv6 router advertisements where not needed, or use RA Guard features on network switches to prevent rogue RA packets. 4. Monitor network traffic for unusual or malformed IPv6 packets indicative of exploitation attempts. 5. Employ host-based intrusion detection systems (HIDS) to detect anomalous behavior or crashes related to NetworkManager. 6. Conduct vulnerability scanning and asset inventory to identify all systems running vulnerable NetworkManager versions. 7. Apply principle of least privilege and network segmentation to limit exposure of critical systems. 8. Stay informed on vendor advisories and apply security patches promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-05-31T13:34:41.061Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68379c5b182aa0cae261d62b

Added to database: 5/28/2025, 11:29:31 PM

Last enriched: 11/20/2025, 7:51:45 AM

Last updated: 11/30/2025, 11:29:16 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats