CVE-2024-53104
ENISA EUVD: EUVD-2024-51776 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
9 articles
Published: 2024-12-02
EPSS Score
Source: FIRST.org · 2026-05-23
13.22%
probability
This CVE has a 13.22% probability
of being exploited in the next 30 days.
0%
Top 94.2th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)In the Linux kernel, the following vulnerability has been resolved:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
Affected Products
Linux
Linux
c0efd232929c2cd87238de2cccdaf4e845be5b0c
c0efd232929c2cd87238de2cccdaf4e845be5b0c
c0efd232929c2cd87238de2cccdaf4e845be5b0c
c0efd232929c2cd87238de2cccdaf4e845be5b0c
c0efd232929c2cd87238de2cccdaf4e845be5b0c
c0efd232929c2cd87238de2cccdaf4e845be5b0c
Linux
Linux
2.6.26
0
4.19.324
5.4.286
5.10.230
5.15.172
Attack Intelligence
Google Project Zero
Discovered
Nov. 7, 2024
Patched
Feb. 1, 2025
Reported by
Benoît Sevens of Google's Threat Analysis Group
Root Cause Analysis
???
Signal Intelligence
Confidence
82%
EPSS
13.22%
CVSS v3.1
7.8
Mentions
9
Last Seen
Apr 07, 2025
CNA Information
CNA Assigner
Linux
CNA Title
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
Analyst Note
CVE-2024-53104 is confirmed as a real vulnerability in the Linux kernel's uvcvideo driver involving out-of-bounds writes due to improper frame type parsing. The fix has been merged upstream, and the HIGH severity CVSS score (7.8) reflects the potential for memory corruption attacks, supported by multiple credible news sources documenting the issue.
Threat Actors 33
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
APT 29
apt_group
Information theft and espionage
🇷🇺 RU
Cobalt
apt_group
Financial crime
🇷🇺 RU
Harvester
apt_group
Information theft and espionage
Unknown
Hacking Team
apt_group
🇮🇹 IT
The Shadow Brokers
apt_group
🇷🇺 RU
Infy
apt_group
Information theft and espionage
🇮🇷 IR
YoroTrooper
apt_group
Information theft and espionage
🇰🇿 KZ
GhostR
apt_group
🇨🇳 CN
[Unnamed group]
apt_group
🇨🇳 CN
RomCom
apt_group
Financial gain
🇷🇺 RU
Silent Lynx
apt_group
Information theft and espionage
🇰🇿 KZ
TraderTraitor
apt_group
🇰🇵 KP
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Void Rabisu
apt_group
Financial gain
🇷🇺 RU
Red Dev 17
apt_group
🇨🇳 CN
Shadow Academy
apt_group
Information theft and espionage
🇮🇷 IR
Soft Cell
apt_group
Information theft and espionage
🇨🇳 CN
Desorden Group
apt_group
🇹🇭 TH
Circles
apt_group
Global
Pat Bear
apt_group
🇸🇾 SY
Operation Digital Eye
apt_group
Information theft and espionage
🇨🇳 CN
Unnamed Actor
apt_group
🇨🇳 CN
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
COBALT JUNO
apt_group
🇮🇷 IR
ALTDOS
apt_group
🇸🇬 SG
Operation Shadow Force
apt_group
🇨🇳 CN
Natohub
apt_group
🇪🇸 ES
Cyber Alliance
apt_group
🇺🇦 UA
Beijing Group
apt_group
Information theft and espionage
🇨🇳 CN
Copy-Paste
apt_group
🇦🇺 AU
Dark Partners
apt_group
Triage Info
Decided atMar 03, 2026
Published DateDec 02, 2024