{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-28085","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2026-05-12T11:51:43.281Z","dateReserved":"2024-03-03T00:00:00.000Z","datePublished":"2024-03-27T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-06-10T16:11:00.153Z"},"descriptions":[{"lang":"en","value":"wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt"},{"url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq"},{"url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/"},{"url":"https://www.openwall.com/lists/oss-security/2024/03/27/5"},{"url":"https://github.com/skyler-ferrante/CVE-2024-28085"},{"name":"[debian-lts-announce] 20240407 [SECURITY] [DLA 3782-1] util-linux security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"},{"name":"[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/1"},{"name":"[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/6"},{"name":"[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/9"},{"name":"[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/8"},{"name":"[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/7"},{"name":"[oss-security] 20240328 Re: Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/2"},{"name":"[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/3"},{"name":"[oss-security] 20240327 CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/5"},{"url":"https://security.netapp.com/advisory/ntap-20240531-0003/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt","tags":["x_transferred"]},{"url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq","tags":["x_transferred"]},{"url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/","tags":["x_transferred"]},{"url":"https://www.openwall.com/lists/oss-security/2024/03/27/5","tags":["x_transferred"]},{"url":"https://github.com/skyler-ferrante/CVE-2024-28085","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20240407 [SECURITY] [DLA 3782-1] util-linux security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"},{"name":"[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/1"},{"name":"[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/6"},{"name":"[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/9"},{"name":"[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/8"},{"name":"[oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/7"},{"name":"[oss-security] 20240328 Re: Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/2"},{"name":"[oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/3"},{"name":"[oss-security] 20240327 CVE-2024-28085: Escape sequence injection in util-linux wall","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/5"},{"url":"https://security.netapp.com/advisory/ntap-20240531-0003/","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2024/Mar/35"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T18:30:25.092Z"}},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-150","lang":"en","description":"CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences"}]}],"affected":[{"vendor":"kernel","product":"util-linux","cpes":["cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"2.40","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":3.3,"attackVector":"LOCAL","baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-26T20:25:25.196139Z","id":"CVE-2024-28085","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-26T20:25:27.912Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:51:43.281Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"SIPLUS S7-1500 CPU 1518-4 PN/DP MFP","versions":[{"status":"affected","version":"V3.1.5","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX MX5000","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX MX5000RE","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1400","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1500","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1501","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1510","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1511","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1512","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1524","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX1536","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM ROX RX5000","versions":[{"status":"affected","version":"0","lessThan":"V2.17.0","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-202008.html"}]}]},"dataVersion":"5.2"}