CVE-2023-46813

7.0 HIGH
Published: October 27, 2023 Modified: February 25, 2026
View on NVD

Description

An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1212649
Source: cve@mitre.org
Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1212649
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.0 / 10.0
EPSS (Exploit Probability)
0.3%
53th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

linux