Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Network
0

CVE-2023-0056

Disclosure Date: March 23, 2023
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.5 Medium
Impact Score:
3.6
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • fedoraproject,
  • haproxy,
  • redhat

Products

  • ceph storage 5.0,
  • extra packages for enterprise linux 8.0,
  • fedora 36,
  • fedora 37,
  • haproxy -,
  • openshift container platform 4.10,
  • openshift container platform 4.11,
  • openshift container platform 4.12,
  • openshift container platform for ibm linuxone 4.10,
  • openshift container platform for ibm linuxone 4.11,
  • openshift container platform for ibm linuxone 4.12,
  • openshift container platform for power 4.10,
  • openshift container platform for power 4.11,
  • openshift container platform for power 4.12,
  • openshift container platform ibm z systems 4.10,
  • openshift container platform ibm z systems 4.11,
  • openshift container platform ibm z systems 4.12,
  • software collections -

Additional Info

Technical Analysis