Lucene search

K
broadcomBroadcom Security ResponseBSNSA22951
HistoryDec 19, 2023 - 12:00 a.m.

Privilege escalation vulnerability in Node.js 20 could allow loading arbitrary OpenSSL engines when the experimental permission model is enabled (CVE-2023-30586).

2023-12-1900:00:00
Broadcom Security Response
support.broadcom.com
18
node.js
openssl
privilege escalation
vulnerability
experimental permission model
cve-2023-30586
crypto.setengine()
attack complexity
brocade fibre channel
broadcom products
brocade sannav

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.1%

A privilege escalation vulnerability exists in Node.js 20 that allowed loading arbitrary OpenSSL engines when the experimental permission model is enabled, which can bypass and/or disable the permission model. The attack complexity is high. However, the crypto.setEngine() API can be used to bypass the permission model when called with a compatible OpenSSL engine. The OpenSSL engine can, for example, disable the permission model in the host process by manipulating the process’s stack memory to locate the permission model Permission::enabled_ in the host process’s heap memory. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

Products Confirmed Not Affected

  • No Brocade Fibre Channel Products from Broadcom Products are known to be affected by this vulnerability.

  • Brocade SANnav is Not Affected - Vex Status Code: Vulnerable_code_cannot_be_controlled_by_adversary.

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.1%