Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-52340: n/a

0
High
VulnerabilityCVE-2023-52340cvecve-2023-52340
Published: Fri Jul 05 2024 (07/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:13:07 UTC

Technical Analysis

CVE-2023-52340 is a denial of service vulnerability found in the IPv6 networking stack of the Linux kernel versions prior to 6.3. The issue arises from the max_size threshold in the net/ipv6/route.c source file, which governs the maximum size of certain routing-related data structures. An attacker can exploit this by sending IPv6 packets in a continuous loop through a raw socket, rapidly consuming the max_size resource. This resource exhaustion causes the kernel to fail in processing legitimate IPv6 packets, resulting in network unreachable errors and effectively a denial of service condition. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption). It requires no privileges or user interaction, and can be triggered remotely by an unauthenticated attacker with network access. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and the significant impact on availability, although confidentiality and integrity remain unaffected. No patches were linked at the time of publication, but upgrading to Linux kernel 6.3 or later is expected to resolve the issue. The vulnerability is particularly concerning for environments heavily reliant on IPv6 and Linux-based systems, including cloud providers, data centers, and enterprise networks.

Potential Impact

The primary impact of CVE-2023-52340 is the disruption of network availability due to denial of service conditions caused by resource exhaustion in the IPv6 routing code. For European organizations, this could lead to significant operational downtime, especially for those with critical services running on Linux servers with IPv6 enabled. Network unreachable errors could interrupt internal communications, cloud services, and customer-facing applications, potentially causing financial losses and reputational damage. The vulnerability does not compromise data confidentiality or integrity but can degrade service reliability and availability. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure are particularly vulnerable due to their reliance on robust network connectivity. The ease of exploitation without authentication increases the risk of opportunistic attacks or targeted disruption campaigns. Additionally, the lack of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2023-52340, organizations should prioritize upgrading their Linux kernel to version 6.3 or later once it becomes available, as this version includes fixes for the vulnerability. In the interim, network administrators should implement monitoring and filtering of raw socket traffic, especially IPv6 packets exhibiting looping or abnormal patterns, using advanced intrusion detection/prevention systems (IDS/IPS) and firewall rules. Limiting the use of raw sockets to trusted processes and users can reduce the attack surface. Network segmentation and rate limiting on IPv6 traffic can also help contain potential exploitation attempts. Regularly auditing and updating IPv6 configurations to ensure they follow best practices will further reduce risk. Organizations should maintain up-to-date incident response plans to quickly identify and respond to denial of service symptoms related to this vulnerability. Collaboration with Linux distribution vendors and security communities for timely patch deployment is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-01-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b61ff58c9332ff0941a

Added to database: 11/4/2025, 5:44:01 PM

Last enriched: 11/4/2025, 6:13:07 PM

Last updated: 11/5/2025, 12:07:33 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats