CVE-2023-46813Improper Privilege Management in Kernel

Severity
7.0HIGHNVD
OSV8.1OSV4.9
EPSS
0.3%
top 43.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 27
Latest updateFeb 23

Description

An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages12 packages

NVDlinux/linux_kernel< 6.5.9
Debianlinux/linux_kernel< 5.10.205-2+3
Ubuntulinux/linux_kernel< 5.15.0-94.104
debiandebian/linux< linux 6.1.64-1 (bookworm)

Patches

🔴Vulnerability Details

10
OSV
linux-azure vulnerabilities2024-02-23
OSV
linux-intel-iotg-5.15 vulnerabilities2024-02-15
OSV
linux-azure, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15 vulnerabilities2024-02-15
OSV
linux-lowlatency, linux-raspi vulnerabilities2024-02-14
OSV
linux-intel-iotg vulnerabilities2024-02-09

📋Vendor Advisories

12
Ubuntu
Linux kernel (Azure) vulnerabilities2024-02-23
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2023-468132024-02-16
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-02-15
Ubuntu
Linux kernel (Azure) vulnerabilities2024-02-15
Ubuntu
Linux kernel vulnerabilities2024-02-14

💬Community

1
Bugzilla
CVE-2023-46813 kernel: SEV-ES local priv escalation2023-10-30
CVE-2023-46813 — Improper Privilege Management | cvebase