CVE-2023-46239

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Oct 31, 2023
Updated: Nov 9, 2023
CWE ID 476
CWE ID 248

Summary

The vulnerability with CVE ID CVE-2023-46239 affects the quic-go implementation of the QUIC protocol in Go. Versions 0.37.0 to 0.37.2 are vulnerable, while version 0.37.3 contains a patch. By serializing an ACK frame after the CRYTPO, an attacker can trigger a nil pointer dereference, leading to a panic and potentially bringing down a quic-go node. This vulnerability can be exploited remotely with minimal effort, as completing the QUIC handshake only requires sending and receiving a few packets. The base severity rating for this vulnerability is HIGH, with an exploitability score of 3.9 out of 10 and an impact score of 3.6 out of 10. Remediation involves updating to version 0.37.3 or later to apply the patch and mitigate the risk posed by this vulnerability. Note: The provided information is a summary based on the available data and does not include any analysis or additional context beyond what is stated in the original text.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-46239 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions