EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Availability.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability. | EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability. |
Wed, 16 Oct 2024 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Eus
|
|
| CPEs | cpe:/a:redhat:rhel_eus:8.8 | |
| Vendors & Products |
Redhat rhel Eus
|
Status: PUBLISHED
Assigner: TianoCore
Published: 2024-01-16T16:12:32.584Z
Updated: 2025-06-02T15:08:40.284Z
Reserved: 2023-10-05T20:48:19.878Z
Link: CVE-2023-45232
Updated: 2024-08-02T20:14:19.743Z
Status : Modified
Published: 2024-01-16T16:15:12.090
Modified: 2025-02-13T18:15:29.863
Link: CVE-2023-45232