CVE-2024-1086

7.8 HIGH CISA KEV - Actively Exploited
Published: January 31, 2024 Modified: October 27, 2025

Description

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/04/10/22
Source: cve-coordination@google.com
Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/10/23
Source: cve-coordination@google.com
Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/14/1
Source: cve-coordination@google.com
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/04/15/2
Source: cve-coordination@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/5
Source: cve-coordination@google.com
Exploit Mailing List
https://github.com/Notselwyn/CVE-2024-1086
Source: cve-coordination@google.com
Exploit Third Party Advisory
https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
Source: cve-coordination@google.com
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
Source: cve-coordination@google.com
Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: cve-coordination@google.com
Mailing List
https://news.ycombinator.com/item?id=39828424
Source: cve-coordination@google.com
Issue Tracking
https://pwning.tech/nftables/
Source: cve-coordination@google.com
Exploit Technical Description Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0009/
Source: cve-coordination@google.com
Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/04/10/22
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/10/23
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://www.openwall.com/lists/oss-security/2024/04/14/1
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
http://www.openwall.com/lists/oss-security/2024/04/15/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/04/17/5
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List
https://github.com/Notselwyn/CVE-2024-1086
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://news.ycombinator.com/item?id=39828424
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://pwning.tech/nftables/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Technical Description Third Party Advisory
https://security.netapp.com/advisory/ntap-20240614-0009/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-1086
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

29 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
83.7%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2024-06-20

Weaknesses (CWE)

Affected Vendors

redhat debian linux fedoraproject netapp