CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
20.1%
EDK2’s Network Package is susceptible to a buffer overflow vulnerability
via a long server ID option in DHCPv6 client. This vulnerability can be
exploited by an attacker to gain unauthorized access and potentially lead
to a loss of Confidentiality, Integrity and/or Availability.
Author | Note |
---|---|
eslerm | “exposure is limited to PXE boot or HTTP boot” patchset available in bug 4518, but not in repo (until Feb-24) fix and unit test commit id likely 0cf3620092c and 1bd40aba86e |
blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
launchpad.net/bugs/cve/CVE-2023-45230
nvd.nist.gov/vuln/detail/CVE-2023-45230
security-tracker.debian.org/tracker/CVE-2023-45230
ubuntu.com/security/notices/USN-6638-1
www.cve.org/CVERecord?id=CVE-2023-45230
www.openwall.com/lists/oss-security/2024/01/16/2
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
20.1%