Impact
An improper access control flaw in the Linux kernel of SUSE Linux Enterprise Server 12 SP5 disables the nftables subsystem, rendering firewall rules ineffective. The vulnerability allows an attacker to bypass the intended network filtering protections, potentially leading to unauthorized network access, data leakage, or disruption of services. The weakness is a classic example of a misconfigured privilege boundary within the kernel, classified under CWE-284.
Affected Systems
Affected products are SUSE Linux Enterprise Server 12 SP5. The flaw exists in all releases before the kernel commit 9c294edb7085fb91650bc12233495a8974c5ff2d, which introduced the fix. Any installation of the 12 SP5 kernel before that point remains vulnerable.
Risk and Exploitability
The CVSS score of 7.3 indicates high severity. However, the EPSS score is below 1%, showing a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires compromising the kernel or gaining privileged access, after which the attacker can effectively disable nftables. While the risk to the confidentiality, integrity, or availability of the network is significant, the low exploitability reduces the urgency compared to high EPSS threats.
OpenCVE Enrichment