Friday, April 25, 2025
HomeCVE/vulnerabilityCISA Alerts on Actively Exploited Linux Kernel Out-of-Bounds & Read Flaw

CISA Alerts on Actively Exploited Linux Kernel Out-of-Bounds & Read Flaw

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has issued alerts regarding two actively exploited vulnerabilities in the Linux Kernel.

The flaws, tagged as CVE-2024-53197 and CVE-2024-53150, both reside in the USB-audio driver. These vulnerabilities could potentially allow attackers to manipulate system memory, escalate privileges, or access sensitive information.

CVE-2024-53197: Linux Kernel Out-of-Bounds Access Vulnerability

The first vulnerability, CVE-2024-53197, stems from an out-of-bounds access bug in the Linux Kernel’s USB-audio driver.

- Advertisement - Google News

This flaw can be exploited by an attacker with physical access to a system by utilizing a malicious USB device. The attacker could potentially:

  • Manipulate system memory,
  • Escalate privileges, or
  • Execute arbitrary code on the targeted system.

This vulnerability is linked to CWE-787 (Out-of-Bounds Write) and is classified as critical due to the impact it could have on affected systems.

While no direct evidence has surfaced linking this flaw to ransomware campaigns, CISA urges immediate action.

Organizations must follow the mitigations provided by vendors, adhere to the Binding Operational Directive (BOD) 22-01 for cloud services, or discontinue the use of the product if no mitigation is available.

  • Date Added to Known Exploits Catalog: April 9, 2025
  • Mitigation Deadline: April 30, 2025

Security teams are advised to prioritize patching systems and ensure that physical access to USB ports is restricted, especially in high-security environments.

CVE-2024-53150: Linux Kernel Out-of-Bounds Read Vulnerability

The second vulnerability, CVE-2024-53150, involves an out-of-bounds read issue in the same USB-audio driver.

Unlike CVE-2024-53197, this flaw is exploitable by a local, privileged attacker who could leverage it to obtain potentially sensitive information, such as system memory details or user credentials.

This vulnerability is associated with CWE-125 (Out-of-Bounds Read). While the exploit does not grant the attacker direct system control, it poses a significant risk of data exposure.

CISA notes that no evidence currently links this vulnerability to ransomware campaigns, but given the sensitive nature of the data that could be exposed, resolving the issue is critical.

  • Date Added to Known Exploits Catalog: April 9, 2025
  • Mitigation Deadline: April 30, 2025

System administrators are encouraged to deploy vendor-recommended patches or mitigation measures as a priority.

Recommendations for Mitigation

CISA advises all impacted users and administrators to:

  1. Apply vendor-provided patches: Vendors have released updates addressing both CVEs. Immediate application is crucial.
  2. Follow BOD 22-01 guidance: Ensure compliance with CISA’s operational security directives, particularly for cloud-based services.
  3. Restrict USB access: If mitigations cannot be implemented immediately, organizations should consider restricting or monitoring physical access to USB ports.

Failure to address these vulnerabilities by the stipulated date could lead to exploitation attempts, particularly as attackers increasingly target Linux systems with similar flaws.

CISA’s alerts underscore the growing threat landscape surrounding Linux-based systems. Organizations are reminded to maintain robust patch management policies and proactively monitor for signs of exploitation.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...