Description
EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Published: 2024-01-16
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4207-1 edk2 security update
Debian DSA Debian DSA DSA-5624-1 edk2 security update
EUVD EUVD EUVD-2023-49536 EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Ubuntu USN Ubuntu USN USN-6638-1 EDK II vulnerabilities
History

Tue, 04 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Wed, 07 May 2025 21:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787

Wed, 07 May 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:30:00 +0000

Type Values Removed Values Added
Description EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

Tue, 22 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:a:tianocore:edk2:-:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Eus Rhel Tus
Tianocore Edk2
cve-icon MITRE

Status: PUBLISHED

Assigner: TianoCore

Published:

Updated: 2025-11-04T18:17:33.536Z

Reserved: 2023-10-05T20:48:19.877Z

Link: CVE-2023-45230

cve-icon Vulnrichment

Updated: 2025-11-04T18:17:33.536Z

cve-icon NVD

Status : Modified

Published: 2024-01-16T16:15:11.727

Modified: 2025-11-04T19:16:00.203

Link: CVE-2023-45230

cve-icon Redhat

Severity : Important

Publid Date: 2024-01-16T00:00:00Z

Links: CVE-2023-45230 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses