Privilege Escalation Vulnerability in Linux Kernel by Linux Foundation
CVE-2023-46813

7HIGH

Key Information:

Vendor

Linux

Vendor
CVE Published:
27 October 2023

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2023-46813?

A vulnerability has been identified in versions of the Linux kernel prior to 6.5.9, which allows local users with access to MMIO registers to exploit incorrect access checks in the #VC handler. The vulnerability centers around instruction emulation within SEV-ES that can enable arbitrary write access to kernel memory, facilitating privilege escalation. This flaw relies on a race condition where a userspace application can replace an instruction before it is processed by the #VC handler, leading to potential unauthorized control over the kernel.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

.