Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6501: Uncontrolled Resource Consumption

0
Low
VulnerabilityCVE-2024-6501cvecve-2024-6501
Published: Tue Jul 09 2024 (07/09/2024, 19:27:11 UTC)
Source: CVE Database V5

Description

A flaw was found in NetworkManager. When a system running NetworkManager with DEBUG logs enabled and an interface eth1 configured with LLDP enabled, a malicious user could inject a malformed LLDP packet. NetworkManager would crash, leading to a denial of service.

AI-Powered Analysis

AILast updated: 11/21/2025, 07:26:32 UTC

Technical Analysis

CVE-2024-6501 is a vulnerability identified in NetworkManager version 1.40, specifically triggered when DEBUG logging is enabled and an interface (eth1) is configured with LLDP (Link Layer Discovery Protocol) enabled. The flaw arises from NetworkManager's improper handling of malformed LLDP packets injected by a malicious user. When such a malformed packet is received, NetworkManager crashes, leading to a denial of service (DoS) condition due to uncontrolled resource consumption. The vulnerability does not affect confidentiality or integrity but impacts availability. Exploitation requires network access to the affected interface, user interaction (sending the malformed packet), and has a high attack complexity, as the attacker must craft a specific malformed LLDP packet. No privileges are required to attempt exploitation. The CVSS v3.1 base score is 3.1, reflecting the low severity of the issue. Currently, there are no known exploits in the wild, and no official patches have been linked yet. This vulnerability is particularly relevant in environments where NetworkManager is configured with DEBUG logs enabled, which is uncommon in production but may be present in testing or troubleshooting scenarios. The flaw underscores the risks of enabling verbose logging in network management components and the need for robust input validation of network protocol packets.

Potential Impact

For European organizations, the primary impact of CVE-2024-6501 is a potential denial of service on systems running NetworkManager 1.40 with DEBUG logging enabled and LLDP active on interface eth1. This could disrupt network management services, potentially affecting network connectivity and monitoring capabilities. While the vulnerability does not compromise data confidentiality or integrity, availability interruptions could impact critical infrastructure, especially in sectors relying on Linux-based network management such as telecommunications, energy, and government networks. The requirement for DEBUG logging and specific LLDP configuration limits the scope, reducing widespread impact. However, organizations using NetworkManager in development, testing, or specialized network environments should be cautious. The absence of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks to cause service outages. Disruptions in network management could delay incident response and network troubleshooting, indirectly affecting operational continuity.

Mitigation Recommendations

To mitigate CVE-2024-6501, organizations should first verify if NetworkManager version 1.40 is deployed and whether DEBUG logging is enabled alongside LLDP on interface eth1. Disabling DEBUG logging in production environments is a critical immediate step, as this reduces the attack surface significantly. Network administrators should audit LLDP configurations and consider disabling LLDP on interfaces where it is not strictly necessary. Monitoring network traffic for malformed LLDP packets can help detect attempted exploitation. Applying patches or updates from NetworkManager maintainers as soon as they become available is essential. Additionally, implementing network segmentation to restrict access to management interfaces and employing intrusion detection systems capable of identifying anomalous LLDP traffic can further reduce risk. Regularly reviewing and hardening network management configurations and logging policies will prevent similar issues. Finally, educating network operations teams about the risks of enabling verbose logging in production environments can help avoid inadvertent exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-07-04T05:13:32.680Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69201212ce2640f942c372e4

Added to database: 11/21/2025, 7:17:38 AM

Last enriched: 11/21/2025, 7:26:32 AM

Last updated: 1/7/2026, 5:24:09 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats