Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5870: Uncontrolled Resource Consumption in Red Hat Red Hat Advanced Cluster Security 4.2

0
Low
VulnerabilityCVE-2023-5870cvecve-2023-5870
Published: Sun Dec 10 2023 (12/10/2023, 17:58:30 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Advanced Cluster Security 4.2

Description

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:39:17 UTC

Technical Analysis

CVE-2023-5870 is a vulnerability identified in Red Hat Advanced Cluster Security 4.2 that involves uncontrolled resource consumption stemming from a flaw in PostgreSQL's handling of the pg_cancel_backend role. This role is responsible for signaling background workers such as the logical replication launcher, autovacuum workers, and the autovacuum launcher. The vulnerability specifically affects non-core PostgreSQL extensions that implement less-resilient background workers. An attacker with high privileges and remote access could exploit this flaw to target a specific background worker process, causing it to consume excessive resources and potentially leading to a denial of service (DoS) condition. The vulnerability does not affect core PostgreSQL background workers but is limited to those introduced by non-core extensions. Exploitation requires high-level privileges and does not involve user interaction, with a low complexity attack vector. The CVSS v3.1 base score is 2.2, reflecting a low severity primarily due to the requirement for high privileges and the limited impact scope (availability impact only on a specific background worker). No known exploits are currently reported in the wild, and no patches or mitigations have been explicitly linked in the provided data. This vulnerability highlights the importance of secure extension development and careful privilege management in PostgreSQL environments integrated with Red Hat Advanced Cluster Security.

Potential Impact

For European organizations, the primary impact of CVE-2023-5870 is the potential for denial of service attacks targeting PostgreSQL background workers within Red Hat Advanced Cluster Security deployments. While the impact is limited to availability and affects only specific background workers in non-core extensions, disruption of these services could degrade cluster security monitoring and management capabilities. This may lead to delayed detection of security incidents or interruptions in cluster operations, which can be critical in regulated industries such as finance, healthcare, and critical infrastructure sectors prevalent in Europe. The requirement for high privileges to exploit the vulnerability reduces the likelihood of widespread abuse but does not eliminate risk, especially in environments where insider threats or compromised administrative accounts exist. Given the reliance on PostgreSQL and Red Hat security products in many European enterprises, the vulnerability could affect operational stability and security posture if left unaddressed.

Mitigation Recommendations

To mitigate CVE-2023-5870, European organizations should implement the following specific measures: 1) Restrict and audit the assignment of the pg_cancel_backend role and other high-privilege roles to minimize the number of users capable of exploiting this vulnerability. 2) Review and harden non-core PostgreSQL extensions deployed within the environment, ensuring they follow best practices for background worker resilience and resource management. 3) Monitor PostgreSQL background worker processes for abnormal resource consumption patterns that could indicate exploitation attempts. 4) Apply any available vendor patches or updates from Red Hat as soon as they are released, even though no patch links are currently provided. 5) Employ network segmentation and access controls to limit remote access to PostgreSQL instances and Red Hat Advanced Cluster Security management interfaces. 6) Incorporate this vulnerability into incident response and security monitoring workflows to detect and respond to potential DoS attempts promptly. These targeted actions go beyond generic advice by focusing on privilege management, extension security, and proactive monitoring specific to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-10-31T03:56:58.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3bcb66c7f7acdd3cb5f

Added to database: 10/4/2025, 10:15:24 AM

Last enriched: 10/4/2025, 10:39:17 AM

Last updated: 10/4/2025, 1:05:26 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats