First published: Fri Sep 20 2024(Updated: )
A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libreswan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9050 has been classified as a moderate severity vulnerability.
To fix CVE-2024-9050, update the libreswan client plugin for NetworkManager to the latest version that addresses this vulnerability.
The potential impacts of CVE-2024-9050 include unauthorized access to VPN configurations due to improper sanitization.
Users of the libreswan client plugin for NetworkManager that rely on local unprivileged user configurations are affected by CVE-2024-9050.
There are no official workarounds for CVE-2024-9050; updating to the patched version is the recommended approach.