CVE-2023-31248
CVSS Score of 10 (low)
Details
Summary
CVE-2023-31248 is a vulnerability in the Linux Kernel's nftables that allows for local privilege escalation. The vulnerability, categorized as CWE-416 (Use After Free), affects multiple products. The affected products include various versions of ohMfk, pKnQK, kFV4F, hI6yDx, oEwyC, gWuwLm, mPkRvA, lLfJcF, oRANl-, fVzo22, gTEj-, lwr8Qv, hSxFJ, jsNHiU, gLYKv-, inDfOz, qrgY8w, lgHYz-, nzvWKk, sdMtg-, s5UiRj, ihNvh-, gZFHx2, lcxR2j , icVJEo , inq4bV , mohdX- , powZV-, mStcM-, iAqOE-, Y3qAIp , t4Ugn-, eDz151 , rh66g- , l_Erb- , uqUyue , qR_OQ-, qjJrb- , ogvP6- , jiKQQ- , fWGaA- , sMgdah and gec3m6. The vulnerability is caused by a failure to check whether a chain is active and if CAP_NET_ADMIN is in any user or network namespace when using the `nft_chain_lookup_byid()` function. Organizations can remediate this vulnerability by applying the necessary updates or patches provided by the Linux Kernel. Exploitation of this vulnerability can result in a high impact on confidentiality and integrity within an organization's systems.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions