CVE-2023-45237

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*

History

07 Mar 2024, 17:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240307-0011/ -

23 Jan 2024, 16:07

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/01/16/2 - () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List
References () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory
CWE CWE-338
CPE cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*
First Time Tianocore
Tianocore edk2
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

16 Jan 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/16/2 -

16 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 16:15

Updated : 2024-03-07 17:15


NVD link : CVE-2023-45237

Mitre link : CVE-2023-45237

CVE.ORG link : CVE-2023-45237


JSON object : View

Products Affected

tianocore

  • edk2
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)