CVE-2024-1454
Opensc: memory use after free in authentic driver when updating token info
CVSS Score
3.4
EPSS Score
0.0%
EPSS Percentile
0th
The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.
| CWE | CWE-416 |
| Published | Feb 12, 2024 |
| Last Updated | Nov 7, 2025 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new low vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N Attack Vector
Physical
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected References
access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-1454 bugs.chromium.org: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2263929 github.com: https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html