CVE-2023-45235

EDK2's Network Package is susceptible to a buffer overflow vulnerability when





handling Server ID option 



 from a DHCPv6 proxy Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.3 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
TianoCoreCNA
8.3 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
VendorProductVersion
tianocoreedk2
𝑥
≤ 202311
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
edk2
bullseye (security)
vulnerable
bullseye
no-dsa
buster
no-dsa
bookworm
2022.11-6+deb12u1
fixed
bookworm (security)
2022.11-6+deb12u1
fixed
trixie
2024.11-2
fixed
sid
2024.11-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
oracular
not-affected
noble
not-affected
mantic
Fixed 2023.05-2ubuntu0.1
released
lunar
ignored
jammy
Fixed 2022.02-3ubuntu0.22.04.2
released
focal
Fixed 0~20191122.bd85bf54-2ubuntu3.5
released
bionic
needs-triage
xenial
needs-triage
trusty
ignored