Lucene search

K
nvd[email protected]NVD:CVE-2023-32250
HistoryJul 10, 2023 - 4:15 p.m.

CVE-2023-32250

2023-07-1016:15:52
CWE-362
web.nvd.nist.gov
1
linux
ksmbd
smb server
vulnerability
code execution

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%

A flaw was found in the Linux kernel’s ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

Affected configurations

NVD
Node
linuxlinux_kernelRange5.156.1.29
OR
linuxlinux_kernelRange6.26.2.16
OR
linuxlinux_kernelRange6.36.3.2
Node
netapphciMatch-
OR
netapphci_storage_nodesMatch-
OR
netapph300sMatch-
OR
netapph410sMatch-
OR
netapph500sMatch-
OR
netapph700sMatch-

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.6%