CVE-2024-53197
ENISA EUVD: EUVD-2024-51869 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
4 articles
Published: 2024-12-27
EPSS Score
Source: FIRST.org · 2026-05-23
2.09%
probability
This CVE has a 2.09% probability
of being exploited in the next 30 days.
0%
Top 84.2th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev->config.
This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.
Affected Products
Linux
Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Linux
Linux
2.6.12
0
4.19.325
5.4.287
5.10.231
5.15.174
Attack Intelligence
Google Project Zero
Discovered
Nov. 20, 2024
Patched
April 1, 2025
Reported by
Benoît Sevens of Google's Threat Analysis Group
Root Cause Analysis
???
Signal Intelligence
Confidence
78%
EPSS
2.09%
CVSS v3.1
7.8
Mentions
4
Last Seen
Apr 07, 2025
CNA Information
CNA Assigner
Linux
CNA Title
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
Analyst Note
CVE-2024-53197 is confirmed as a legitimate kernel vulnerability affecting USB audio devices, with a HIGH CVSS score (7.8) and documented in Google Project Zero, indicating credible security research. The vulnerability involves a memory safety issue (out-of-bounds access) in ALSA USB audio handling for specific device models, which is a well-understood attack vector in kernel code. While not yet in CISA's KEV catalog, the Google Project Zero attribution and availability of fix patches support the confirmed classification.
Threat Actors 24
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
APT 29
apt_group
Information theft and espionage
🇷🇺 RU
Cobalt
apt_group
Financial crime
🇷🇺 RU
Harvester
apt_group
Information theft and espionage
Unknown
Hacking Team
apt_group
🇮🇹 IT
The Shadow Brokers
apt_group
🇷🇺 RU
Infy
apt_group
Information theft and espionage
🇮🇷 IR
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
GhostR
apt_group
🇨🇳 CN
TraderTraitor
apt_group
🇰🇵 KP
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Shadow Academy
apt_group
Information theft and espionage
🇮🇷 IR
Soft Cell
apt_group
Information theft and espionage
🇨🇳 CN
Desorden Group
apt_group
🇹🇭 TH
Circles
apt_group
Global
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
COBALT JUNO
apt_group
🇮🇷 IR
ALTDOS
apt_group
🇸🇬 SG
Operation Shadow Force
apt_group
🇨🇳 CN
Cyber Alliance
apt_group
🇺🇦 UA
Beijing Group
apt_group
Information theft and espionage
🇨🇳 CN
Copy-Paste
apt_group
🇦🇺 AU
Dark Partners
apt_group
Triage Info
Decided atMar 03, 2026
Published DateDec 27, 2024