Skip to content

Critical Rust Standard Library Vulnerability - 20240416004

Overview

The Rust Security Response WG has been notified that certain version of Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping.

What is vulnerable?

CVE Severity CVSS Product(s) Affected Summary Dated
CVE-2024-24576 Critical 10.0 Rust standard library prior to version 1.77.2 This vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. 11 April, 2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month (refer Patch Management):