Lucene search

K
nvd[email protected]NVD:CVE-2023-5178
HistoryNov 01, 2023 - 5:15 p.m.

CVE-2023-5178

2023-11-0117:15:11
CWE-416
web.nvd.nist.gov
vulnerability
nvme
tcp
linux
use-after-free
remote code execution
privilege escalation

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.0%

A use-after-free vulnerability was found in drivers/nvme/target/tcp.cinnvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.

Affected configurations

NVD
Node
linuxlinux_kernelRange5.05.4.260
OR
linuxlinux_kernelRange5.55.10.199
OR
linuxlinux_kernelRange5.115.15.137
OR
linuxlinux_kernelRange5.166.1.60
OR
linuxlinux_kernelRange6.26.5.9
Node
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
Node
netappactive_iq_unified_managerMatch-vmware_vsphere
OR
netappsolidfire_\&_hci_management_nodeMatch-
OR
netappsolidfire_\&_hci_storage_nodeMatch-

References

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.024 Low

EPSS

Percentile

90.0%