CVE-2024-48990

HIGH

Ubuntu needrestart Privilege Escalation

Title source: metasploit
STIX 2.1

Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

Exploits (21)

nomisec WORKING POC 106 stars
by makuga01 · poc
https://github.com/makuga01/CVE-2024-48990-PoC
nomisec WORKING POC 25 stars
by pentestfunctions · poc
https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing
nomisec WORKING POC 8 stars
by Serner77 · poc
https://github.com/Serner77/CVE-2024-48990-Automatic-Exploit
nomisec WORKING POC 5 stars
by czeti · poc
https://github.com/czeti/CVE-2024-48990_needrestart
nomisec WORKING POC 5 stars
by ten-ops · poc
https://github.com/ten-ops/CVE-2024-48990_needrestart
nomisec WORKING POC 5 stars
by ally-petitt · poc
https://github.com/ally-petitt/CVE-2024-48990-Exploit
nomisec WORKING POC 5 stars
by ns989 · poc
https://github.com/ns989/CVE-2024-48990
nomisec WORKING POC 2 stars
by tahsinunluturk · poc
https://github.com/tahsinunluturk/needrestart-privesc-cve-2024-48990
nomisec WORKING POC 2 stars
by Cyb3rFr0g · poc
https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC
nomisec WORKING POC 1 stars
by sobbing333 · poc
https://github.com/sobbing333/CVE-2024-48990-POC
nomisec WORKING POC 1 stars
by o-sec · poc
https://github.com/o-sec/CVE-2024-48990
nomisec WORKING POC 1 stars
by 0x3bs · poc
https://github.com/0x3bs/CVE-2024-48990
nomisec WORKING POC 1 stars
by Mr-DJ · poc
https://github.com/Mr-DJ/CVE-2024-48990
nomisec WORKING POC 1 stars
by NullByte-7w7 · poc
https://github.com/NullByte-7w7/CVE-2024-48990
nomisec WORKING POC
by BLUEBERRYP1LL · poc
https://github.com/BLUEBERRYP1LL/CVE-2024-48990
nomisec WORKING POC
by grecosamuel · poc
https://github.com/grecosamuel/CVE-2024-48990
nomisec WORKING POC
by Loaxert · poc
https://github.com/Loaxert/CVE-2024-48990-PoC
nomisec WORKING POC
by mladicstefan · poc
https://github.com/mladicstefan/CVE-2024-48990
nomisec WRITEUP
by CyberCrowCC · poc
https://github.com/CyberCrowCC/CVE-2024-48990
nomisec WORKING POC
by felmoltor · poc
https://github.com/felmoltor/CVE-2024-48990
metasploit WORKING POC GREAT
by h00die, makuga01, qualys · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/ubuntu_needrestart_lpe.rb

Scores

CVSS v3 7.8
EPSS 0.1525
EPSS Percentile 94.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-427
Status published
Products (1)
needrestart_project/needrestart < 3.8
Published Nov 19, 2024
Tracked Since Feb 18, 2026