Use of Less Trusted Source Affecting NetworkManager-tui package, versions <1:1.46.0-34.el9_4


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
2.91% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-NETWORKMANAGERTUI-13013196
  • published23 Sept 2025
  • disclosed6 May 2024

Introduced: 6 May 2024

CVE-2024-3661  (opens in a new tab)
CWE-348  (opens in a new tab)

How to fix?

Upgrade RHEL:9 NetworkManager-tui to version 1:1.46.0-34.el9_4 or higher.
This issue was patched in RHSA-2025:16411.

NVD Description

Note: Versions mentioned in the description apply only to the upstream NetworkManager-tui package and not the NetworkManager-tui package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

CVSS Base Scores

version 3.1