EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
Metrics
Affected Vendors & Products
References
History
Wed, 07 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Wed, 07 May 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. | EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. |
Tue, 22 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:tianocore:edk2:-:*:*:*:*:*:*:* | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: TianoCore
Published: 2024-01-16T16:08:01.058Z
Updated: 2025-05-07T20:15:44.890Z
Reserved: 2023-10-05T20:48:19.877Z
Link: CVE-2023-45230

Updated: 2024-08-02T20:14:19.957Z

Status : Modified
Published: 2024-01-16T16:15:11.727
Modified: 2025-05-07T21:15:57.907
Link: CVE-2023-45230
