CVSS Score of 10 (low)


Published Jul 5, 2023
Updated: Feb 1, 2024
CWE ID 416


CVE-2023-31248 is a vulnerability in the Linux Kernel's nftables that allows for local privilege escalation. The vulnerability, categorized as CWE-416 (Use After Free), affects multiple products. The affected products include various versions of ohMfk, pKnQK, kFV4F, hI6yDx, oEwyC, gWuwLm, mPkRvA, lLfJcF, oRANl-, fVzo22, gTEj-, lwr8Qv, hSxFJ, jsNHiU, gLYKv-, inDfOz, qrgY8w, lgHYz-, nzvWKk, sdMtg-, s5UiRj, ihNvh-, gZFHx2, lcxR2j , icVJEo , inq4bV , mohdX- , powZV-, mStcM-, iAqOE-, Y3qAIp , t4Ugn-, eDz151 , rh66g- , l_Erb- , uqUyue , qR_OQ-, qjJrb- , ogvP6- , jiKQQ- , fWGaA- , sMgdah and gec3m6. The vulnerability is caused by a failure to check whether a chain is active and if CAP_NET_ADMIN is in any user or network namespace when using the `nft_chain_lookup_byid()` function. Organizations can remediate this vulnerability by applying the necessary updates or patches provided by the Linux Kernel. Exploitation of this vulnerability can result in a high impact on confidentiality and integrity within an organization's systems.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-31248 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options