Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-40546: NULL Pointer Dereference in Red Hat Red Hat Enterprise Linux 7

0
Medium
VulnerabilityCVE-2023-40546cvecve-2023-40546
Published: Mon Jan 29 2024 (01/29/2024, 16:29:26 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 7

Description

A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:34:15 UTC

Technical Analysis

CVE-2023-40546 is a vulnerability identified in the Shim component of Red Hat Enterprise Linux 7. Shim is a small bootloader used in the UEFI Secure Boot process to verify and load signed bootloaders and kernels. The flaw arises when Shim attempts to create a new ESL (EFI Signature List) variable and encounters an error. In this failure scenario, Shim tries to log an error message to the user. However, the logging function is called with a mismatch between the number of parameters and the format string, which leads to a NULL pointer dereference and causes the program to crash. This crash results in a denial of service condition during the boot process or when managing EFI variables. The vulnerability does not affect confidentiality or integrity but impacts availability by causing a system crash. The CVSS v3.1 base score is 6.2 (medium severity), reflecting a local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), and high impact on availability (A:H). There are no known exploits in the wild at the time of publication, and no patches or mitigations were linked in the provided data. The vulnerability is specific to Red Hat Enterprise Linux 7, a widely used enterprise Linux distribution, particularly in server and cloud environments.

Potential Impact

For European organizations, especially those relying on Red Hat Enterprise Linux 7 in critical infrastructure, data centers, or cloud services, this vulnerability could lead to unexpected system crashes during boot or EFI variable management. This denial of service could disrupt business operations, cause downtime, and impact service availability. Since the flaw is local and does not require user interaction or privileges, it could be exploited by an attacker with local access, such as a malicious insider or through compromised accounts. The impact is primarily on availability, which could affect services that require high uptime, such as financial institutions, healthcare providers, and government agencies. While no confidentiality or integrity breach is indicated, the disruption caused by system crashes could indirectly affect operational continuity and trust in IT systems.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Apply any available patches or updates from Red Hat as soon as they are released to address the logging function mismatch causing the NULL pointer dereference. 2) Restrict local access to systems running Red Hat Enterprise Linux 7 to trusted personnel only, minimizing the risk of local exploitation. 3) Monitor system logs and boot processes for abnormal crashes or error messages related to Shim or EFI variable management. 4) Consider upgrading to a later version of Red Hat Enterprise Linux where this vulnerability is not present or has been fixed. 5) Implement robust access controls and auditing on systems that manage EFI variables to detect and prevent unauthorized changes. 6) Maintain regular backups and disaster recovery plans to quickly restore systems in case of denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-08-15T20:04:15.615Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c1b66c7f7acdd3e969

Added to database: 10/4/2025, 10:15:29 AM

Last enriched: 10/4/2025, 10:34:15 AM

Last updated: 10/16/2025, 1:19:09 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats