CVE-2023-52266

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Dec 31, 2023
Updated: Jan 9, 2024
CWE ID 416

Summary

CVE-2023-52266, also known as ehttp 1.0.6 before 17405b9 has an epoll_socket.cpp read_func use-after-free vulnerability. This vulnerability affects ehttp version 1.0.6 and earlier versions. An attacker can exploit this vulnerability by making multiple connections over a short period of time, triggering the use-after-free vulnerability. The base severity of this vulnerability is rated as HIGH and it has a CVSS score of 7.5 according to NVD@NIST.gov. The potential danger it poses to an organization is that an attacker can remotely execute arbitrary code or cause a denial-of-service condition, leading to the compromise of sensitive information or disruption of services provided by the affected system. It is recommended to remediate this vulnerability by updating to a patched version of ehttp that addresses the use-after-free issue.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-52266 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options