Lucene search

K
cve[email protected]CVE-2023-45235
HistoryJan 16, 2024 - 4:15 p.m.

CVE-2023-45235

2024-01-1616:15:12
CWE-119
web.nvd.nist.gov
44
20
edk2
network package
buffer overflow
vulnerability
dhcpv6
proxy
advertise message
unauthorized access
confidentiality
integrity
availability
nvd
cve-2023-45235

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.1%

EDK2’s Network Package is susceptible to a buffer overflow vulnerability when

handling Server ID option

from a DHCPv6 proxy Advertise message. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

Affected configurations

NVD
Node
tianocoreedk2Range202311
CPENameOperatorVersion
tianocore:edk2tianocore edk2le202311

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "edk2",
    "vendor": "TianoCore",
    "versions": [
      {
        "status": "affected",
        "version": "edk2-stable202308"
      }
    ]
  }
]

Social References

More

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.1%