CVE-2024-53197

ENISA EUVD: EUVD-2024-51869 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 4 articles Published: 2024-12-27

EPSS Score

Source: FIRST.org · 2026-05-23
2.09%
probability
This CVE has a 2.09% probability of being exploited in the next 30 days.
0% Top 84.2th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration.

Affected Products

Linux
Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Linux
Linux
2.6.12 0 4.19.325 5.4.287 5.10.231 5.15.174

Attack Intelligence

Google Project Zero

Discovered
Nov. 20, 2024
Patched
April 1, 2025
Reported by
Benoît Sevens of Google's Threat Analysis Group
Root Cause Analysis
???

Signal Intelligence

Confidence
78%
EPSS 2.09%
CVSS v3.1 7.8
Mentions 4
Last Seen Apr 07, 2025

CNA Information

CNA Assigner
Linux
CNA Title
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices

Analyst Note

CVE-2024-53197 is confirmed as a legitimate kernel vulnerability affecting USB audio devices, with a HIGH CVSS score (7.8) and documented in Google Project Zero, indicating credible security research. The vulnerability involves a memory safety issue (out-of-bounds access) in ALSA USB audio handling for specific device models, which is a well-understood attack vector in kernel code. While not yet in CISA's KEV catalog, the Google Project Zero attribution and availability of fix patches support the confirmed classification.

Threat Actors 24

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
APT 29
apt_group Information theft and espionage 🇷🇺 RU
Cobalt
apt_group Financial crime 🇷🇺 RU
Harvester
apt_group Information theft and espionage Unknown
Hacking Team
apt_group 🇮🇹 IT
The Shadow Brokers
apt_group 🇷🇺 RU
Infy
apt_group Information theft and espionage 🇮🇷 IR
Group 27
apt_group Information theft and espionage 🇨🇳 CN
GhostR
apt_group 🇨🇳 CN
TraderTraitor
apt_group 🇰🇵 KP
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Shadow Academy
apt_group Information theft and espionage 🇮🇷 IR
Soft Cell
apt_group Information theft and espionage 🇨🇳 CN
Desorden Group
apt_group 🇹🇭 TH
Circles
apt_group Global
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
COBALT JUNO
apt_group 🇮🇷 IR
ALTDOS
apt_group 🇸🇬 SG
Operation Shadow Force
apt_group 🇨🇳 CN
Cyber Alliance
apt_group 🇺🇦 UA
Beijing Group
apt_group Information theft and espionage 🇨🇳 CN
Copy-Paste
apt_group 🇦🇺 AU
Dark Partners
apt_group

Triage Info

Decided atMar 03, 2026
Published DateDec 27, 2024