CVE-2024-9050
Rocky Linux vulnerability analysis and mitigation

Overview

A security vulnerability (CVE-2024-9050) was discovered in the NetworkManager-libreswan client plugin for NetworkManager, where it fails to properly sanitize VPN configurations from local unprivileged users. The vulnerability was discovered and fixed in NetworkManager-libreswan.git version 1.2.24. The issue affects various versions of Red Hat Enterprise Linux and was assigned a CVSS v3.1 base score of 7.8 (High) (NVD, Red Hat).

Technical details

The vulnerability stems from the plugin's failure to escape special characters in the VPN configuration's key-value format. This allows malicious users to manipulate the configuration by injecting newline characters, causing values to be interpreted as keys. The most critical parameter that can be exploited is the 'leftupdown' key, which accepts an executable command as a value and is normally used to specify the NM-libreswan callback for retrieving configuration settings. Since NetworkManager uses Polkit to allow unprivileged users to control network configuration, this flaw can be exploited to achieve privilege escalation (OSS Security).

Impact

The vulnerability allows a local unprivileged user to achieve local privilege escalation and potentially execute arbitrary code with root privileges on the targeted machine through malicious VPN configuration. This is possible because the 'leftupdown' parameter can be manipulated to execute arbitrary commands with elevated privileges (NVD).

Mitigation and workarounds

The vulnerability has been fixed in NetworkManager-libreswan.git version 1.2.24 through commit dcf8acfb25bd ('all: rework formatting of ipsec.conf'). Red Hat has released security updates for affected versions of Red Hat Enterprise Linux through multiple security advisories. Users are advised to update to the patched versions available through their respective distribution channels (Red Hat).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-0891HIGH8.1
  • Mozilla FirefoxMozilla Firefox
  • MozillaFirefox
NoYesJan 13, 2026
CVE-2025-24528HIGH7.1
  • KerberosKerberos
  • krb5
NoYesJan 16, 2026
CVE-2026-0890MEDIUM5.4
  • Mozilla FirefoxMozilla Firefox
  • firefox-esr
NoYesJan 13, 2026
CVE-2026-0886MEDIUM5.3
  • Mozilla FirefoxMozilla Firefox
  • MozillaThunderbird-translations-common
NoYesJan 13, 2026
CVE-2026-0887MEDIUM4.3
  • Mozilla FirefoxMozilla Firefox
  • MozillaFirefox-branding-upstream
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management