๐Ÿ” CVE Alert

CVE-2024-1454

LOW 3.4

Opensc: memory use after free in authentic driver when updating token info

CVSS Score
3.4
EPSS Score
0.0%
EPSS Percentile
0th

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CWE CWE-416
Published Feb 12, 2024
Last Updated Nov 7, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new low vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Physical
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-1454 bugs.chromium.org: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2263929 github.com: https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html