Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-rq4n-gfwv-uqbb
Vulnerability ID VCID-rq4n-gfwv-uqbb
Aliases CVE-2024-32004
Summary git: RCE while cloning local repos
Status Published
Exploitability 0.5
Weighted Severity 7.4
Risk 3.7
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32004.json
epss 0.02428 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02428 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02428 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02428 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02631 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02631 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02631 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
epss 0.02631 https://api.first.org/data/v1/epss?cve=CVE-2024-32004
cvssv3.1 8.1 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.2 https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8
ssvc Track https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8
cvssv3.1 8.2 https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389
ssvc Track https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389
cvssv3.1 8.2 https://git-scm.com/docs/git-clone
ssvc Track https://git-scm.com/docs/git-clone
cvssv3.1 8.2 https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
ssvc Track https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
cvssv3.1 8.2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
cvssv3.1 8.2 http://www.openwall.com/lists/oss-security/2024/05/14/2
ssvc Track http://www.openwall.com/lists/oss-security/2024/05/14/2
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32004.json
https://api.first.org/data/v1/epss?cve=CVE-2024-32004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1071160 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160
2 http://www.openwall.com/lists/oss-security/2024/05/14/2
2280428 https://bugzilla.redhat.com/show_bug.cgi?id=2280428
f4aa8c8bb11dae6e769cd930565173808cbb69c8 https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8
GHSA-xfc6-vwr8-r389 https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389
git-clone https://git-scm.com/docs/git-clone
msg00018.html https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
RHSA-2024:4083 https://access.redhat.com/errata/RHSA-2024:4083
RHSA-2024:4084 https://access.redhat.com/errata/RHSA-2024:4084
RHSA-2024:4368 https://access.redhat.com/errata/RHSA-2024:4368
RHSA-2024:4579 https://access.redhat.com/errata/RHSA-2024:4579
RHSA-2024:6027 https://access.redhat.com/errata/RHSA-2024:6027
RHSA-2024:6028 https://access.redhat.com/errata/RHSA-2024:6028
RHSA-2024:6610 https://access.redhat.com/errata/RHSA-2024:6610
RHSA-2024:7701 https://access.redhat.com/errata/RHSA-2024:7701
S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
USN-6793-1 https://usn.ubuntu.com/6793-1/
USN-7023-1 https://usn.ubuntu.com/7023-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32004.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/ Found at https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/ Found at https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://git-scm.com/docs/git-clone
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/ Found at https://git-scm.com/docs/git-clone
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/ Found at https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2024/05/14/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/ Found at http://www.openwall.com/lists/oss-security/2024/05/14/2
Exploit Prediction Scoring System (EPSS)
Percentile 0.85138
EPSS Score 0.02428
Published At April 9, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:47:43.347087+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32004.json 38.0.0