CVE-2024-53104

ENISA EUVD: EUVD-2024-51776 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 9 articles Published: 2024-12-02

EPSS Score

Source: FIRST.org · 2026-05-23
13.22%
probability
This CVE has a 13.22% probability of being exploited in the next 30 days.
0% Top 94.2th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.

Affected Products

Linux
Linux
c0efd232929c2cd87238de2cccdaf4e845be5b0c c0efd232929c2cd87238de2cccdaf4e845be5b0c c0efd232929c2cd87238de2cccdaf4e845be5b0c c0efd232929c2cd87238de2cccdaf4e845be5b0c c0efd232929c2cd87238de2cccdaf4e845be5b0c c0efd232929c2cd87238de2cccdaf4e845be5b0c
Linux
Linux
2.6.26 0 4.19.324 5.4.286 5.10.230 5.15.172

Attack Intelligence

Google Project Zero

Discovered
Nov. 7, 2024
Patched
Feb. 1, 2025
Reported by
Benoît Sevens of Google's Threat Analysis Group
Root Cause Analysis
???

Signal Intelligence

Confidence
82%
EPSS 13.22%
CVSS v3.1 7.8
Mentions 9
Last Seen Apr 07, 2025

CNA Information

CNA Assigner
Linux
CNA Title
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

Analyst Note

CVE-2024-53104 is confirmed as a real vulnerability in the Linux kernel's uvcvideo driver involving out-of-bounds writes due to improper frame type parsing. The fix has been merged upstream, and the HIGH severity CVSS score (7.8) reflects the potential for memory corruption attacks, supported by multiple credible news sources documenting the issue.

Threat Actors 33

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
APT 29
apt_group Information theft and espionage 🇷🇺 RU
Cobalt
apt_group Financial crime 🇷🇺 RU
Harvester
apt_group Information theft and espionage Unknown
Hacking Team
apt_group 🇮🇹 IT
The Shadow Brokers
apt_group 🇷🇺 RU
Infy
apt_group Information theft and espionage 🇮🇷 IR
YoroTrooper
apt_group Information theft and espionage 🇰🇿 KZ
GhostR
apt_group 🇨🇳 CN
[Unnamed group]
apt_group 🇨🇳 CN
RomCom
apt_group Financial gain 🇷🇺 RU
Silent Lynx
apt_group Information theft and espionage 🇰🇿 KZ
TraderTraitor
apt_group 🇰🇵 KP
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Void Rabisu
apt_group Financial gain 🇷🇺 RU
Red Dev 17
apt_group 🇨🇳 CN
Shadow Academy
apt_group Information theft and espionage 🇮🇷 IR
Soft Cell
apt_group Information theft and espionage 🇨🇳 CN
Desorden Group
apt_group 🇹🇭 TH
Circles
apt_group Global
Pat Bear
apt_group 🇸🇾 SY
Operation Digital Eye
apt_group Information theft and espionage 🇨🇳 CN
Unnamed Actor
apt_group 🇨🇳 CN
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
COBALT JUNO
apt_group 🇮🇷 IR
ALTDOS
apt_group 🇸🇬 SG
Operation Shadow Force
apt_group 🇨🇳 CN
Natohub
apt_group 🇪🇸 ES
Cyber Alliance
apt_group 🇺🇦 UA
Beijing Group
apt_group Information theft and espionage 🇨🇳 CN
Copy-Paste
apt_group 🇦🇺 AU
Dark Partners
apt_group

Triage Info

Decided atMar 03, 2026
Published DateDec 02, 2024