CVE-2024-27134
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-27134 is a local privilege escalation vulnerability discovered in MLflow when using the sparkudf functionality. The vulnerability was disclosed on November 25, 2024, and affects MLflow versions up to (excluding) 2.16.0. The issue stems from excessive directory permissions that can be exploited by a local attacker using a Time-of-check Time-of-use (ToCToU) attack when the sparkudf() MLflow API is called (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.0 HIGH with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is associated with two CWE categories: CWE-367 (Time-of-check Time-of-use Race Condition) and CWE-276 (Incorrect Default Permissions). The issue specifically manifests when using the spark_udf() MLflow API, where improper directory permissions can be exploited through a ToCToU attack (NVD).

Impact

The vulnerability allows a local attacker to gain elevated permissions within the system. The high CVSS score indicates potential severe impacts on confidentiality, integrity, and availability of the system when successfully exploited (NVD).

Mitigation and workarounds

A fix for this vulnerability has been implemented through a pull request (#10874) to address the privilege escalation issue. Users are advised to upgrade to MLflow version 2.16.0 or later which contains the security fix (GitHub PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management