CVE-2024-5148
Linux Ubuntu vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2024-5148) was discovered in GNOME Remote Desktop versions 46.0 and 46.1. The vulnerability stems from inadequate validation of session agents using D-Bus methods related to transitioning a client connection from the login screen to the user session. This flaw affects the gnome-remote-desktop system daemon, which was introduced in version 46 to enable remote graphical sessions through the GNOME Display Manager (GDM) (SecurityOnline, NVD).

Technical details

The vulnerability exists in an unauthenticated D-Bus interface, which allows any local user to interact with sensitive system functions. The issue specifically involves the 'Dispatcher' and 'Handover' interfaces that are not properly authorized and are accessible to all local users in the system. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (RedHat).

Impact

The vulnerability can lead to multiple security implications: exposure of the system RDP TLS certificate and private key to unauthorized users, leak of system credentials in cleartext, and potential hijacking of RDP client connections during the login screen-to-user session transition. This compromises the integrity and privacy of RDP connections on affected systems (SecurityOnline).

Mitigation and workarounds

Organizations and individuals using GNOME Remote Desktop versions 46.0 or 46.1 are strongly advised to update to version 46.2 or later. The bug fix in version 46.2 restricts access to the handover interface to authorized users only, mitigating the risk of unauthorized access. The fix is implemented through commit 9fbaae1a, which ensures that only the user for whom a new session has been created can call the handover interface (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Related Linux Ubuntu vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62408MEDIUM5.9
  • Linux DebianLinux Debian
  • c-ares
NoNoDec 08, 2025
CVE-2023-53769N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug
NoYesDec 08, 2025
CVE-2023-53768N/AN/A
  • Linux DebianLinux Debian
  • linux-aws-fips
NoYesDec 08, 2025
CVE-2023-53767N/AN/A
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoYesDec 08, 2025
CVE-2023-53766N/AN/A
  • Linux DebianLinux Debian
  • linux-aws-hwe
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management