CVE-2023-0386

7.8HIGH

Key Information:

Vendor
Linux
Status
Kernel
Vendor
CVE Published:
22 March 2023

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

Affected Version(s)

Kernel Linux kernel 6.2-rc6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2023-0386 | Vulnerabilities

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file

5 months ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by yitian.ir

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database9 Proof of Concept(s)1 News Article(s)
.