Bug 1218887 (CVE-2023-45237) - VUL-0: CVE-2023-45237: edk2, ovmf: Use of a Weak PseudoRandom Number Generator
Summary: VUL-0: CVE-2023-45237: edk2, ovmf: Use of a Weak PseudoRandom Number Generator
Status: NEW
Alias: CVE-2023-45237
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Joey Lee
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/391385/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-45237:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-17 04:49 UTC by SMASH SMASH
Modified: 2024-05-17 11:24 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
stoyan.manolov: needinfo? (jlee)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-01-17 04:49:31 UTC
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized  access and potentially lead to a loss of Confidentiality.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45237
https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
https://www.cve.org/CVERecord?id=CVE-2023-45237
http://www.openwall.com/lists/oss-security/2024/01/16/2
https://bugzilla.redhat.com/show_bug.cgi?id=2258706
Comment 3 Joey Lee 2024-03-06 02:17:10 UTC
EDk2 doesn't have patch yet:

https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h

9. CVE-2023-45237
    CVSS 5.3 : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
...
Mitigation release plan

Patch files for vulnerabilities 1-7 are available now via https://bugzilla.tianocore.org/show_bug.cgi?id=4518. These patches will be integrated for the Feb 2024 EDK2 release.

For vulnerabilities 8 and 9, patches do not exist at this time. We are not aware of any exploits for vulnerabilities 8 and 9, either in the wild or in the lab. Exposure is limited to PXE boot or HTTP boot on an untrusted network, which is not a recommended usage for the UEFI network stack.
This GHSA will be updated when fixes become available.