EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality.
References
Configurations
History
13 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality. |
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List | |
References | () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240307-0011/ - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
07 Mar 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jan 2024, 16:07
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tianocore
Tianocore edk2 |
|
CWE | CWE-338 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:* | |
References | () https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/01/16/2 - Mailing List |
16 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jan 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-16 16:15
Updated : 2025-02-13 18:15
NVD link : CVE-2023-45237
Mitre link : CVE-2023-45237
CVE.ORG link : CVE-2023-45237
JSON object : View
Products Affected
tianocore
- edk2
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)