Known Exploited Vulnerabilities CVE-2024-50302

The Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2024-50302 Linux Kernel Use of Uninitialized Resource Vulnerability exploitation_technique T1091 Replication Through Removable Media
Comments
Attackers can use malicious Human Interface Devices (keyboard, mouse, etc.) to trigger a kernel-level memory leak due to improper initialization and use of uninitialized resources. This leads to the returning of the uninitialized kernel data, which can be collected and exfiltrated.
References
CVE-2024-50302 Linux Kernel Use of Uninitialized Resource Vulnerability primary_impact T1005 Data from Local System
Comments
Attackers can use malicious Human Interface Devices (keyboard, mouse, etc.) to trigger a kernel-level memory leak due to improper initialization and use of uninitialized resources. This leads to the returning of the uninitialized kernel data, which can be collected and exfiltrated.
References
CVE-2024-50302 Linux Kernel Use of Uninitialized Resource Vulnerability secondary_impact T1011 Exfiltration Over Other Network Medium
Comments
Attackers can use malicious Human Interface Devices (keyboard, mouse, etc.) to trigger a kernel-level memory leak due to improper initialization and use of uninitialized resources. This leads to the returning of the uninitialized kernel data, which can be collected and exfiltrated.
References