CVE-2023-6534

In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
freebsdCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
freebsdfreebsd
12.4
freebsdfreebsd
12.4:p1
freebsdfreebsd
12.4:p2
freebsdfreebsd
12.4:p3
freebsdfreebsd
12.4:p4
freebsdfreebsd
12.4:p5
freebsdfreebsd
12.4:p6
freebsdfreebsd
12.4:p7
freebsdfreebsd
12.4:p8
freebsdfreebsd
12.4:rc2-p1
freebsdfreebsd
12.4:rc2-p2
freebsdfreebsd
13.2
freebsdfreebsd
13.2:p1
freebsdfreebsd
13.2:p2
freebsdfreebsd
13.2:p3
freebsdfreebsd
13.2:p4
freebsdfreebsd
13.2:p5
freebsdfreebsd
13.2:p6
freebsdfreebsd
14.0
freebsdfreebsd
14.0:beta5
freebsdfreebsd
14.0:p1
freebsdfreebsd
14.0:rc3
freebsdfreebsd
14.0:rc4-p1
𝑥
= Vulnerable software versions