### [CVE-2022-29800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29800) ![](https://img.shields.io/static/v1?label=Product&message=networkd-dispatcher&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-367&color=brighgreen) ### Description A time-of-check-time-of-use (TOCTOU) race condition vulnerability was found in networkd-dispatcher. This flaw exists because there is a certain time between the scripts being discovered and them being run. An attacker can abuse this vulnerability to replace scripts that networkd-dispatcher believes to be owned by root with ones that are not. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/DDNvR/privelege_escalation - https://github.com/backloop-biz/CVE_checks - https://github.com/jfrog/nimbuspwn-tools - https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io