CVE-2024-27322
R for Windows vulnerability analysis and mitigation

Overview

A critical deserialization vulnerability (CVE-2024-27322) was discovered in the R statistical programming language affecting versions from 1.4.0 up to but not including 4.4.0. The vulnerability enables maliciously crafted RDS (R Data Serialization) formatted files or R packages to execute arbitrary code on an end user's system when interacted with (HiddenLayer Research, CERT VU).

Technical details

The vulnerability exploits R's serialization and deserialization process through the use of promise objects and lazy evaluation. The attack involves crafting a malicious RDS file containing a promise instruction that sets the value to unbound_value and includes arbitrary code in the expression. Due to lazy evaluation, the malicious code is executed when the deserialized object is accessed. The vulnerability received a CVSS v3.1 Base Score of 8.8 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability has far-reaching implications across multiple sectors including healthcare, finance, and government agencies that use R for statistical analysis and machine learning. The issue affects over 135,000 R source files referencing readRDS, including projects from major software vendors like R Studio, Facebook, Google, Microsoft, and AWS. Additionally, the vulnerability can be exploited through R packages in the CRAN repository, which hosts over 20,000 packages, potentially enabling supply chain attacks (HiddenLayer Research).

Mitigation and workarounds

The vulnerability has been patched in R version 4.4.0, which restricts promises in the serialization stream so they are not used for implementing lazy evaluation. Users are strongly advised to upgrade to this version or later. Fedora has also released security updates for versions 38 and 39 to address this vulnerability (Fedora Update).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management