Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-26438
HistoryAug 02, 2023 - 1:15 p.m.

Authorization

2023-08-0213:15:00
PRIOn knowledge base
www.prio-n.com
10
external service
toctou weakness
jdk dns cache
attackers
configuration injection
network infrastructure
service availability
exploits

4.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.0%

External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS cache expiry correctly were able to inject configuration that would bypass existing network deny-lists. Attackers could exploit this weakness to discover the existence of restricted network infrastructure and service availability. Improvements were made to include deny-lists not only during the check of the provided connection data, but also during use. No publicly available exploits are known.

4.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.0%

Related for PRION:CVE-2023-26438