Vulnerability Description
Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Ethernet Controller Rdma Driver For Linux | < 1.9.30 |
Related Weaknesses (CWE)
References
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.hVendor Advisory
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
- https://security.netapp.com/advisory/ntap-20230915-0013/
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.hVendor Advisory
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
- https://security.netapp.com/advisory/ntap-20230915-0013/
FAQ
What is CVE-2023-25775?
CVE-2023-25775 is a vulnerability with a CVSS score of 5.6 (MEDIUM). Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network acce...
How severe is CVE-2023-25775?
CVE-2023-25775 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25775?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Ethernet Controller Rdma Driver For Linux.