{
  "threat_severity" : "Moderate",
  "public_date" : "2024-01-16T00:00:00Z",
  "bugzilla" : {
    "description" : "edk2: Out of Bounds read when handling a ND Redirect message with truncated options",
    "id" : "2258688",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2258688"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-125",
  "details" : [ "EDK2's Network Package is susceptible to an out-of-bounds read\nvulnerability when processing  Neighbor Discovery Redirect message. This\nvulnerability can be exploited by an attacker to gain unauthorized \naccess and potentially lead to a loss of Confidentiality.", "A security loophole involving an out-of-bounds read was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity of the network to transmit a specifically crafted Neighbor Discovery Redirect message. Consequently, this may lead to the unauthorized reading of memory beyond the message boundaries, potentially resulting in the exposure of sensitive information." ],
  "statement" : "The out-of-bounds read vulnerability in EDK2 represents a moderate security concern. This flaw, found in the open-source implementation of the UEFI specification, allows an attacker within the local network to exploit the issue by sending a carefully crafted Neighbor Discovery Redirect message. While requiring proximity for exploitation, the vulnerability could lead to unauthorized memory access and potential leakage of sensitive information.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-05-22T00:00:00Z",
    "advisory" : "RHSA-2024:3017",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "edk2-0:20220126gitbb1bba3d77-13.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-04-30T00:00:00Z",
    "advisory" : "RHSA-2024:2264",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "edk2-0:20231122-6.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support",
    "release_date" : "2024-07-09T00:00:00Z",
    "advisory" : "RHSA-2024:4419",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.2",
    "package" : "edk2-0:20221207gitfff6d81270b5-9.el9_2.3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-45231\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-45231\nhttps://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html\nhttps://github.com/advisories/GHSA-pr27-mhpp-2ccr" ],
  "name" : "CVE-2023-45231",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}