Attacker Value
Very High
(1 user assessed)
Exploitability
Unknown
(1 user assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Local
1

CVE-2023-0266

Disclosure Date: January 30, 2023
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Execution
Techniques
Validation
Validated
Initial Access
Techniques
Validation
Validated
Validated

Description

A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTLELEM{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

Add Assessment

1
Ratings
  • Attacker Value
    Very High
Technical Analysis

Google’s Threat Analysis Group (TAG) released an advisory regarding zero-day vulnerabilities in Android, iOS, and Chromium-based browsers that could allow a threat actor to spy on affected devices. Threat actors targeted users via SMS phishing messages. The SMS contained a URL shortener (bit[.]ly) that delivered the exploit and redirected the victim to a spoof Variston website. The payload is a C++ malware containing functions that steal data from messaging platforms and browser applications. Users are encouraged to update their devices’ applications, firmware, and operating systems to prevent further exploitation of unpatched systems.

CVSS V3 Severity and Metrics
Base Score:
7.8 High
Impact Score:
5.9
Exploitability Score:
1.8
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • linux

Products

  • linux kernel

Additional Info

Technical Analysis