Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-45235: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in TianoCore edk2

0
High
VulnerabilityCVE-2023-45235cvecve-2023-45235cwe-119
Published: Tue Jan 16 2024 (01/16/2024, 16:11:41 UTC)
Source: CVE Database V5
Vendor/Project: TianoCore
Product: edk2

Description

EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.

AI-Powered Analysis

AILast updated: 11/11/2025, 01:12:05 UTC

Technical Analysis

CVE-2023-45235 is a buffer overflow vulnerability identified in the TianoCore edk2 project, specifically within its Network Package that handles DHCPv6 proxy Advertise messages. The flaw arises from improper restriction of operations within the bounds of a memory buffer (CWE-119) when processing the Server ID option in these messages. This vulnerability allows an attacker to send a specially crafted DHCPv6 proxy Advertise message that triggers a buffer overflow, potentially enabling arbitrary code execution or system compromise at the firmware level. Since edk2 is a widely used open-source UEFI firmware implementation, this vulnerability affects systems that utilize the edk2-stable202308 version or similar builds incorporating the vulnerable Network Package. The CVSS 3.1 score of 8.3 reflects the high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact includes high confidentiality loss, low integrity impact, and high availability impact, indicating potential for unauthorized data access and system disruption. Although no exploits are currently known in the wild, the vulnerability's nature and ease of exploitation make it a significant risk, especially in environments where DHCPv6 proxy messages are processed by vulnerable firmware. The flaw could be exploited remotely by attackers on the same or adjacent network segment, such as within enterprise LANs or managed service provider networks. The vulnerability underscores the criticality of securing firmware components, which are foundational to system security and stability.

Potential Impact

For European organizations, the impact of CVE-2023-45235 can be substantial, particularly for those relying on hardware and firmware that incorporate the TianoCore edk2 Network Package. Compromise at the firmware level can lead to persistent unauthorized access, bypassing traditional OS-level security controls. Confidentiality breaches could expose sensitive corporate or personal data, while integrity loss might allow attackers to manipulate system behavior or firmware settings. Availability impacts could result in system crashes or denial of service, disrupting business operations. Sectors such as finance, healthcare, telecommunications, and critical infrastructure are especially vulnerable due to their reliance on secure and stable firmware. Additionally, organizations using DHCPv6 in their network environments may be more exposed, as the attack vector involves DHCPv6 proxy Advertise messages. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention. The threat also raises concerns for supply chain security, as firmware compromise can propagate through hardware vendors and service providers.

Mitigation Recommendations

1. Monitor for and apply official patches or firmware updates from TianoCore or hardware vendors as soon as they become available to address CVE-2023-45235. 2. Implement network segmentation and restrict DHCPv6 traffic to trusted devices and segments, minimizing exposure to potentially malicious DHCPv6 proxy Advertise messages. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous or malformed DHCPv6 traffic patterns indicative of exploitation attempts. 4. Conduct firmware integrity checks and enable secure boot features to detect unauthorized firmware modifications. 5. Engage with hardware vendors to verify if their products incorporate the vulnerable edk2 version and request guidance or updates. 6. Educate network administrators about the risks associated with DHCPv6 and encourage disabling DHCPv6 proxy features if not required. 7. Maintain comprehensive asset inventories to identify devices running vulnerable firmware versions for prioritized remediation. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting unusual firmware-level behaviors. 9. Establish incident response plans that include firmware compromise scenarios to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TianoCore
Date Reserved
2023-10-05T20:48:19.879Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690904ac00ff46172d4a0d23

Added to database: 11/3/2025, 7:38:20 PM

Last enriched: 11/11/2025, 1:12:05 AM

Last updated: 12/20/2025, 11:31:21 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats