CVE-2023-32233

HIGH EXPLOITED

Linux Kernel < 4.14.315 - Use After Free

Title source: rule

Description

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.

Exploits (5)

nomisec WORKING POC 370 stars
by Liuk3r · local
https://github.com/Liuk3r/CVE-2023-32233
nomisec WORKING POC 49 stars
by oferchen · local
https://github.com/oferchen/POC-CVE-2023-32233
nomisec WORKING POC 3 stars
by PIDAN-HEIDASHUAI · local
https://github.com/PIDAN-HEIDASHUAI/CVE-2023-32233
nomisec WORKING POC 1 stars
by void0red · local
https://github.com/void0red/CVE-2023-32233
nomisec WORKING POC
by RogelioPumajulca · local
https://github.com/RogelioPumajulca/TEST-CVE-2023-32233

Scores

CVSS v3 7.8
EPSS 0.0069
EPSS Percentile 72.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-12-06
CWE
CWE-416
Status published
Products (9)
linux/linux_kernel 3.13 - 4.14.315
netapp/hci_baseboard_management_controller h300s
netapp/hci_baseboard_management_controller h410c
netapp/hci_baseboard_management_controller h410s
netapp/hci_baseboard_management_controller h500s
netapp/hci_baseboard_management_controller h700s
redhat/enterprise_linux 7.0
redhat/enterprise_linux 8.0
redhat/enterprise_linux 9.0
Published May 08, 2023
Tracked Since Feb 18, 2026