Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-4535: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 9

0
Medium
VulnerabilityCVE-2023-4535cvecve-2023-4535
Published: Mon Nov 06 2023 (11/06/2023, 16:57:45 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 9

Description

CVE-2023-4535 is an out-of-bounds read vulnerability in the OpenSC package's MyEID driver on Red Hat Enterprise Linux 9. It requires physical access and a specially crafted USB device or smart card to exploit. The flaw allows manipulation of APDU responses, potentially leading to unauthorized access to sensitive data. The vulnerability impacts confidentiality, integrity, and availability but has a medium severity score of 4. 5. No known exploits are currently in the wild. European organizations using Red Hat Enterprise Linux 9 with OpenSC and smart card authentication are at risk, especially in sectors requiring strong hardware-based security. Mitigations include applying vendor patches when available, restricting physical access, and monitoring for unusual device interactions. Countries with significant Red Hat Enterprise Linux adoption and critical infrastructure using smart cards, such as Germany, France, and the UK, are most likely affected.

AI-Powered Analysis

AILast updated: 11/21/2025, 06:58:55 UTC

Technical Analysis

CVE-2023-4535 is a medium severity out-of-bounds read vulnerability identified in the OpenSC package within the MyEID driver on Red Hat Enterprise Linux 9. The vulnerability arises when handling symmetric key encryption operations involving APDU (Application Protocol Data Unit) responses, which are used in communication with smart cards and USB security tokens. An attacker with physical access can exploit this flaw by connecting a specially crafted USB device or smart card that triggers the out-of-bounds read condition. This manipulation can lead to unauthorized disclosure or manipulation of sensitive cryptographic data, potentially compromising system security. The vulnerability requires high attack complexity, no privileges, and user interaction (physical device insertion), with a scope that affects confidentiality, integrity, and availability. Currently, there are no known exploits in the wild, and no patches have been explicitly linked in the provided data, though vendor updates are expected. The vulnerability is particularly relevant for environments relying on hardware-based authentication or encryption tokens, such as government, finance, and critical infrastructure sectors.

Potential Impact

For European organizations, the impact of CVE-2023-4535 can be significant in environments where smart cards or USB security tokens are used for authentication or cryptographic operations on Red Hat Enterprise Linux 9 systems. Successful exploitation could lead to unauthorized access to sensitive credentials or cryptographic keys, undermining the confidentiality and integrity of protected data. This could facilitate further attacks such as privilege escalation or lateral movement within networks. Availability impact is also possible if the system becomes unstable due to malformed device interactions. Sectors like finance, government, healthcare, and critical infrastructure that rely on hardware tokens for strong authentication are particularly at risk. The requirement for physical access limits remote exploitation but raises concerns about insider threats or physical security breaches. The medium severity rating reflects the balance between the potential impact and the exploitation complexity.

Mitigation Recommendations

1. Monitor for and restrict physical access to critical systems, especially those using smart cards or USB tokens for authentication. 2. Implement strict device control policies to prevent unauthorized USB devices from connecting to sensitive systems. 3. Apply vendor patches and updates promptly once available from Red Hat or OpenSC maintainers. 4. Employ endpoint security solutions capable of detecting anomalous device interactions or malformed APDU communications. 5. Conduct regular audits of hardware token usage and access logs to identify suspicious activity. 6. Consider additional layers of authentication or encryption that do not solely rely on vulnerable hardware drivers. 7. Educate staff on the risks of physical device insertion and enforce policies against connecting untrusted devices. 8. Use hardware security modules (HSMs) or alternative cryptographic solutions where feasible to reduce reliance on vulnerable drivers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-08-25T07:57:47.663Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69200c2a59bb91a9a9a60fba

Added to database: 11/21/2025, 6:52:26 AM

Last enriched: 11/21/2025, 6:58:55 AM

Last updated: 11/21/2025, 7:00:10 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats