Impact
A use‑after‑free condition in the FreeBSD TIOCNOTTY handler allows a process that has cleared its controlling terminal to later access a dangling pointer in the terminal structure after the process exits. An attacker can use the freed reference to elevate privileges and gain root access.
Affected Systems
FreeBSD is the affected vendor. No specific product release or version information is listed in the advisory; the vulnerability applies to all affected FreeBSD releases for which the TIOCNOTTY handler implementation is unpatched.
Risk and Exploitability
The CVSS score is not provided, and EPSS is unavailable, but the vulnerability is known to allow local processes to gain root credentials. Since the attack requires the attacker to invoke the TIOCNOTTY ioctl on a controlling terminal, the likely vector is local access. The CVE is not listed in the CISA KEV catalog, yet it remains a critical privilege‑escalation flaw.
OpenCVE Enrichment