
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-5138 affects the snapctl component within snapd, which allows a confined snap to interact with the snapd daemon. The vulnerability was discovered on May 7, 2024, and fixed in version 2.63.1. The issue stems from improper parsing of command-line arguments, allowing an unprivileged user to trigger authorized actions that would normally require administrator privileges (NVD, GHSA).
The vulnerability exists in snapctl's argument parsing mechanism where it fails to properly handle the '--' argument terminator. This allows unprivileged users to bypass authorization checks by crafting malicious command line arguments that confuse snapd into thinking a help message is requested. The issue has been assigned a CVSS v3.1 base score of 8.1 (HIGH) by CISA-ADP with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H and is classified as CWE-20 (Improper Input Validation) (NVD, Launchpad).
The vulnerability can be exploited by unprivileged users to perform denial-of-service attacks or similar unauthorized actions. For example, on a default Ubuntu installation with Firefox snap, an attacker could cause a denial-of-service by repeatedly mounting hunspell database, potentially exhausting system memory. The impact is limited to snaps that have been granted specific permissions through interface connections (GHSA).
As a temporary workaround, users can disconnect any instances of the mount-control interface to prevent snapd from creating mount points. For Firefox snap specifically, the host-hunspell plug can be disconnected using the command 'sudo snap disconnect firefox:host-hunspell'. The permanent fix is available in snapd version 2.63.1, which properly handles the argument parsing (GHSA).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”