Lucene search

K
cve[email protected]CVE-2023-0751
HistoryFeb 08, 2023 - 8:15 p.m.

CVE-2023-0751

2023-02-0820:15:24
CWE-20
web.nvd.nist.gov
34
geli
key file
null key
master key
encryption
security vulnerability

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.9%

When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.

Affected configurations

NVD
Node
freebsdfreebsdMatch12.3-
OR
freebsdfreebsdMatch12.3p1
OR
freebsdfreebsdMatch12.3p2
OR
freebsdfreebsdMatch12.3p3
OR
freebsdfreebsdMatch12.3p4
OR
freebsdfreebsdMatch12.3p5
OR
freebsdfreebsdMatch12.4-
OR
freebsdfreebsdMatch12.4rc2-p1
OR
freebsdfreebsdMatch12.4rc2-p2
OR
freebsdfreebsdMatch13.1-
OR
freebsdfreebsdMatch13.1b1-p1
OR
freebsdfreebsdMatch13.1b2-p2
OR
freebsdfreebsdMatch13.1p1
OR
freebsdfreebsdMatch13.1p2
OR
freebsdfreebsdMatch13.1p3
OR
freebsdfreebsdMatch13.1p4
OR
freebsdfreebsdMatch13.1p5
OR
freebsdfreebsdMatch13.1rc1-p1

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "geli"
    ],
    "product": "FreeBSD",
    "vendor": "FreeBSD",
    "versions": [
      {
        "lessThan": "13.1-RELEASE-p6",
        "status": "affected",
        "version": "13.1-RELEASE",
        "versionType": "release"
      },
      {
        "lessThan": "12.4-RELEASE-p1",
        "status": "affected",
        "version": "12.4-RELEASE",
        "versionType": "release"
      },
      {
        "lessThan": "12.3-RELEASE-p11",
        "status": "affected",
        "version": "12.3-RELEASE",
        "versionType": "release"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.9%