{"uuid": "eb2bfe76-78c4-4b7c-b006-08fc0cc5be84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1488", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3545", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1488\n\ud83d\udd25 CVSS Score: 8.0 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.\n\ud83d\udccf Published: 2024-02-15T06:31:35Z\n\ud83d\udccf Modified: 2025-01-31T00:30:43Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-1488\n2. https://access.redhat.com/errata/RHSA-2024:1750\n3. https://access.redhat.com/errata/RHSA-2024:1751\n4. https://access.redhat.com/errata/RHSA-2024:1780\n5. https://access.redhat.com/errata/RHSA-2024:1801\n6. https://access.redhat.com/errata/RHSA-2024:1802\n7. https://access.redhat.com/errata/RHSA-2024:1804\n8. https://access.redhat.com/errata/RHSA-2024:2587\n9. https://access.redhat.com/errata/RHSA-2024:2696\n10. https://access.redhat.com/errata/RHSA-2025:0837\n11. https://access.redhat.com/security/cve/CVE-2024-1488\n12. https://bugzilla.redhat.com/show_bug.cgi?id=2264183", "creation_timestamp": "2025-01-31T01:12:29.000000Z"}