Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2024-50302 | Linux Kernel Use of Uninitialized Resource Vulnerability | exploitation_technique | T1091 | Replication Through Removable Media |
Comments
Attackers can use malicious Human Interface Devices (keyboard, mouse, etc.) to trigger a kernel-level memory leak due to improper initialization and use of uninitialized resources. This leads to the returning of the uninitialized kernel data, which can be collected and exfiltrated.
References
|
CVE-2024-50302 | Linux Kernel Use of Uninitialized Resource Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
Attackers can use malicious Human Interface Devices (keyboard, mouse, etc.) to trigger a kernel-level memory leak due to improper initialization and use of uninitialized resources. This leads to the returning of the uninitialized kernel data, which can be collected and exfiltrated.
References
|
CVE-2024-50302 | Linux Kernel Use of Uninitialized Resource Vulnerability | secondary_impact | T1011 | Exfiltration Over Other Network Medium |
Comments
Attackers can use malicious Human Interface Devices (keyboard, mouse, etc.) to trigger a kernel-level memory leak due to improper initialization and use of uninitialized resources. This leads to the returning of the uninitialized kernel data, which can be collected and exfiltrated.
References
|