Lucene search

K
nvd[email protected]NVD:CVE-2023-6534
HistoryDec 13, 2023 - 9:15 a.m.

CVE-2023-6534

2023-12-1309:15:34
web.nvd.nist.gov
freebsd
pf(4)
tcp
sequence
validation
vulnerability
denial-of-service
attack
firewall

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.0%

In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. Β This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.

Affected configurations

NVD
Node
freebsdfreebsdMatch12.4-
OR
freebsdfreebsdMatch12.4p1
OR
freebsdfreebsdMatch12.4p2
OR
freebsdfreebsdMatch12.4p3
OR
freebsdfreebsdMatch12.4p4
OR
freebsdfreebsdMatch12.4p5
OR
freebsdfreebsdMatch12.4p6
OR
freebsdfreebsdMatch12.4p7
OR
freebsdfreebsdMatch12.4p8
OR
freebsdfreebsdMatch12.4rc2-p1
OR
freebsdfreebsdMatch12.4rc2-p2
OR
freebsdfreebsdMatch13.2-
OR
freebsdfreebsdMatch13.2p1
OR
freebsdfreebsdMatch13.2p2
OR
freebsdfreebsdMatch13.2p3
OR
freebsdfreebsdMatch13.2p4
OR
freebsdfreebsdMatch13.2p5
OR
freebsdfreebsdMatch13.2p6
OR
freebsdfreebsdMatch14.0-
OR
freebsdfreebsdMatch14.0beta5
OR
freebsdfreebsdMatch14.0p1
OR
freebsdfreebsdMatch14.0rc3
OR
freebsdfreebsdMatch14.0rc4-p1

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.0%