The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-28085

CVE-2024-28085: Kernel Util-linux Auth Bypass Vulnerability

CVE-2024-28085 is an authentication bypass flaw in Kernel Util-linux's wall command that allows attackers to send escape sequences to users' terminals. This article covers technical details, affected versions, and mitigation.

Published: January 28, 2026

CVE-2024-28085 Overview

CVE-2024-28085 is a terminal escape sequence injection vulnerability in the wall command of util-linux through version 2.40. The wall utility, commonly installed with setgid tty permissions on Linux systems, allows attackers to send arbitrary escape sequences to other users' terminals through command-line arguments (argv). While the utility correctly blocks escape sequences received from standard input (stdin), it fails to sanitize escape sequences passed through argv, potentially enabling social engineering attacks or account takeover in certain scenarios.

Critical Impact

Local attackers with basic user privileges can inject terminal escape sequences to manipulate other users' terminal displays, potentially leading to credential theft through fake prompts or terminal manipulation attacks.

Affected Products

  • util-linux through version 2.40
  • Debian Linux 10.0
  • Systems with wall installed with setgid tty permissions

Discovery Timeline

  • March 27, 2024 - CVE-2024-28085 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2024-28085

Vulnerability Analysis

The vulnerability resides in the wall command's input handling mechanism. The wall utility is designed to broadcast messages to all users logged into a system, typically used for system administration announcements. When installed with setgid tty permissions, the utility has elevated privileges to write to other users' terminal devices.

The core issue stems from inconsistent input sanitization. The developers implemented filtering for escape sequences received from stdin to prevent terminal manipulation attacks, recognizing the security implications of allowing arbitrary control characters to be written to other users' terminals. However, this same sanitization was not applied to messages passed through command-line arguments.

Terminal escape sequences (ANSI escape codes) can be used maliciously to manipulate terminal output in various ways, including clearing screens, repositioning cursors, changing text colors, or even creating fake login prompts. An attacker could craft a malicious message containing escape sequences that, when displayed on a victim's terminal, could present a convincing fake sudo password prompt or other credential harvesting interface.

Root Cause

The root cause is an input validation bypass vulnerability (CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences). The wall command applies different sanitization rules depending on the input source - escape sequences are filtered from stdin but are passed through unfiltered when provided via argv. This inconsistency creates an exploitable condition where attackers can bypass the intended security controls by simply passing their malicious payload as a command-line argument rather than through stdin.

Attack Vector

This is a local attack vector requiring the attacker to have basic user-level access to the system. The attack requires:

  1. Local access to the target system with a valid user account
  2. The wall command installed with setgid tty permissions
  3. Other users actively logged into terminals on the same system

An attacker would craft a message containing ANSI escape sequences designed to manipulate the victim's terminal display. By passing this crafted message as an argument to the wall command, the escape sequences bypass the stdin filtering and are written directly to all logged-in users' terminals. The attacker could create fake prompts, hide their message in the terminal output, or manipulate the display in ways that could trick users into revealing sensitive information.

For technical details on exploitation techniques, refer to the GitHub PoC Repository and the official security advisory.

Detection Methods for CVE-2024-28085

Indicators of Compromise

  • Unusual wall command executions containing escape sequence patterns (e.g., \\x1b[, \033[)
  • Suspicious authentication attempts following wall broadcasts
  • User reports of unexpected terminal behavior or fake prompts appearing
  • System logs showing wall invocations with unusually long or encoded arguments

Detection Strategies

  • Monitor process execution logs for wall command invocations with arguments containing escape sequences or non-printable characters
  • Implement terminal session logging to capture and analyze suspicious broadcast messages
  • Deploy endpoint detection rules to flag wall executions with encoded payloads matching ANSI escape sequence patterns
  • Review authentication logs for credential submission attempts that correlate temporally with wall broadcasts

Monitoring Recommendations

  • Enable auditd rules to log all wall command executions along with their arguments
  • Configure SIEM correlation rules to detect patterns of wall usage followed by authentication events
  • Implement user behavior analytics to identify anomalous wall usage patterns
  • Consider alerting on wall commands executed by non-administrative users

How to Mitigate CVE-2024-28085

Immediate Actions Required

  • Update util-linux to a patched version that filters escape sequences from argv
  • Remove setgid tty permissions from the wall binary if the utility is not required
  • Restrict wall command usage to administrative users only via file permissions or PAM configurations
  • Enable the mesg n setting for all users to prevent unsolicited terminal messages

Patch Information

Security patches addressing this vulnerability are available from distribution maintainers. The Debian LTS Announcement provides patched packages for Debian systems. Updated packages can be obtained from the Linux Utils GitHub Repository. Additionally, NetApp has issued a security advisory for affected products.

Workarounds

  • Set mesg n in user shell profiles to disable terminal message reception
  • Remove setgid permissions from the wall binary: chmod g-s /usr/bin/wall
  • Restrict wall execution to the root user only
  • Consider uninstalling or disabling the wall utility if not required for operations
bash
# Configuration example
# Disable message reception for the current user
mesg n

# Add to /etc/profile or user's .bashrc to disable by default
echo "mesg n" >> /etc/profile

# Remove setgid permissions from wall (requires root)
chmod g-s /usr/bin/wall

# Alternatively, restrict wall to root only
chmod 700 /usr/bin/wall

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechUtil Linux

  • SeverityLOW

  • CVSS Score3.3

  • EPSS Probability11.92%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-150
  • Technical References
  • Openwall OSS Security List Update

  • Openwall OSS Security List Update

  • Openwall OSS Security List Update

  • GitHub PoC Repository

  • GitHub Security Advisory

  • Debian LTS Announcement

  • Linux Utils GitHub Repository

  • RIT Blog Post

  • NetApp Security Advisory

  • Openwall OSS Security List Update

  • Full Disclosure Security Mailing List
  • Vendor Resources
  • Openwall OSS Security List Update

  • Openwall OSS Security List Update

  • Openwall OSS Security List Update

  • Openwall OSS Security List Update

  • Openwall OSS Security List Update
  • Latest CVEs
  • CVE-2026-8468: Elixir Plug Library DoS Vulnerability

  • CVE-2026-8295: simdjson Information Disclosure Vulnerability

  • CVE-2025-68421: Comarch ERP Optima Auth Bypass Vulnerability

  • CVE-2025-68420: Comarch ERP Optima Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English