CVE-2023-45231
Out-of-Bounds Read in EDK II Network Package
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
EDK2's Network Package is susceptible to an out-of-bounds read
vulnerability when processing Neighbor Discovery Redirect message. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality.
El paquete de red de EDK2 es susceptible a una vulnerabilidad de lectura fuera de los límites al procesar el mensaje de redirección de descubrimiento de vecinos. Un atacante puede aprovechar esta vulnerabilidad para obtener acceso no autorizado y potencialmente provocar una pérdida de confidencialidad.
A security loophole involving an out-of-bounds read was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity of the network to transmit a specifically crafted Neighbor Discovery Redirect message. Consequently, this may lead to the unauthorized reading of memory beyond the message boundaries, potentially resulting in the exposure of sensitive information.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-10-05 CVE Reserved
- 2024-01-16 CVE Published
- 2024-01-24 EPSS Updated
- 2024-08-30 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
- CAPEC-540: Overread Buffers
References (7)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h | 2024-03-13 | |
https://access.redhat.com/security/cve/CVE-2023-45231 | 2024-07-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2258688 | 2024-07-09 |