firewalld <=2.4.0 appears to mis-authorize two runtime D-Bus setters, setZoneSettings2 and setPolicySettings, by guarding them with PK_ACTION_CONFIG_INFO. When the shipped desktop policy is active, that appears to let a local unprivileged user modify runtime firewall state without authentication. The attacker needs to have local, unprivileged access to a system with firewalld using the desktop profile of firewalld.