Cyber Posture

CVE-2024-57906

High

Published: 19 January 2025

Published
19 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0002 4.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57906 is a high-severity Use of Uninitialized Resource (CWE-908) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 4.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through kernel patching directly fixes the uninitialized buffer array in the ti-ads8688 driver, preventing kernel memory disclosure to userspace.

prevent

Memory protection mechanisms restrict unauthorized access to kernel memory, mitigating leaks through vulnerable driver buffers.

prevent

Information output filtering sanitizes data from the IIO triggered buffer before exposure to userspace, blocking uninitialized kernel contents.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1082 System Information Discovery Discovery
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
Why these techniques?

Local kernel memory disclosure via uninitialized buffer directly enables reading sensitive data from the local system (T1005) and can reveal system/hardware details (T1082).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads8688: fix information leak in triggered buffer The 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set…

more

values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Initialize the array to zero before using it to avoid pushing uninitialized information to userspace.

Deeper analysisAI

CVE-2024-57906 is an information disclosure vulnerability in the Linux kernel's Industrial I/O (IIO) subsystem, specifically the ti-ads8688 analog-to-digital converter (ADC) driver. The issue arises in the triggered buffer handling, where a local 'buffer' array used to push data to userspace is not fully initialized. While the driver assigns values only to active channels via iio_for_each_active_channel(), inactive channels retain uninitialized memory contents, which are then exposed to userspace. This flaw, classified under CWE-908 (Use of Uninitialized Resource), carries a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).

A local attacker with low privileges (PR:L) can exploit this vulnerability with low complexity and no user interaction required. By triggering buffer reads on the affected driver, the attacker can obtain sensitive uninitialized kernel memory leaked through inactive channels, achieving high confidentiality impact. The high availability impact likely stems from potential kernel instability or denial-of-service effects during exploitation attempts.

Mitigation involves applying upstream kernel patches, as detailed in the referenced stable commit fixes: 1c80a0985a9a, 2a7377ccfd94, 3bf8d1e87939, 455df95eb8b2, and 485570ed82b7. These commits initialize the buffer array to zero before use, preventing the leak of uninitialized data to userspace. Security practitioners should update affected Linux kernels promptly, particularly those using the ti-ads8688 driver in embedded or industrial environments.

Details

CWE(s)

Affected Products

linux
linux kernel
6.13 · 4.19.198 — 4.20 · 5.4.132 — 5.5 · 5.10.50 — 5.11

CVEs Like This One

CVE-2024-57907Same product: Linux Linux Kernel
CVE-2024-57908Same product: Linux Linux Kernel
CVE-2024-57910Same product: Linux Linux Kernel
CVE-2024-57912Same product: Linux Linux Kernel
CVE-2024-57909Same product: Linux Linux Kernel
CVE-2024-57911Same product: Linux Linux Kernel
CVE-2026-31626Same product: Linux Linux Kernel
CVE-2024-57905Same product: Linux Linux Kernel
CVE-2026-31693Same product: Linux Linux Kernel
CVE-2026-23003Same product: Linux Linux Kernel

References