Impact
The vulnerability arises from missing validation of parameters passed to the ptrace(PT_SC_REMOTE) operation when invoking the syscall(2) and __syscall(2) meta‑system calls. An attacker who can attach to a process with debug privileges can trigger arbitrary kernel code execution, resulting in local privilege escalation. The flaw corresponds to the improper handling of user input that corrupts kernel memory, a typical example of the CWE‑787 class.
Affected Systems
The affected product is FreeBSD. Specific version numbers are not listed by the CNA, so the flaw likely exists in all current releases that incorporate the buggy ptrace implementation.
Risk and Exploitability
Because the flaw allows a local user with debug rights to execute code at kernel level, it poses a high severity risk. The CVSS score is 8.4. The EPSS score is < 1%, indicating a very low probability of exploitation, and the vulnerability is not in the CISA KEV catalog. The attack requires local access and the ability to debug a process, which are common capabilities for users who are allowed to attach to running services. If exploited, an attacker could gain full system control.
OpenCVE Enrichment