Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5870: Uncontrolled Resource Consumption in Red Hat Red Hat Advanced Cluster Security 4.2

0
Low
VulnerabilityCVE-2023-5870cvecve-2023-5870
Published: Sun Dec 10 2023 (12/10/2023, 17:58:30 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Advanced Cluster Security 4.2

Description

A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

AI-Powered Analysis

AILast updated: 11/20/2025, 04:08:17 UTC

Technical Analysis

CVE-2023-5870 addresses a vulnerability in Red Hat Advanced Cluster Security 4.2 stemming from PostgreSQL's handling of the pg_cancel_backend role, which is responsible for signaling background workers. These workers include critical components such as the logical replication launcher, autovacuum workers, and the autovacuum launcher. The flaw arises when a non-core PostgreSQL extension implements a background worker that is less resilient to cancellation signals. A remote attacker with high privileges can exploit this by sending cancellation signals to these background workers, causing uncontrolled resource consumption and potentially triggering a denial of service (DoS) condition on the affected worker. This does not affect the core PostgreSQL background workers but only those introduced by third-party extensions. The attack requires no user interaction but does require authenticated high-privileged access, limiting the attack surface. The vulnerability has a CVSS 3.1 score of 2.2, indicating low severity due to its limited impact (only availability of a specific background worker) and the complexity of exploitation. No public exploits or active exploitation have been reported. The vulnerability highlights the importance of carefully managing PostgreSQL extensions and monitoring resource usage in cluster security environments.

Potential Impact

For European organizations, the primary impact is a potential denial of service on specific PostgreSQL background workers introduced by non-core extensions within Red Hat Advanced Cluster Security 4.2 environments. This could degrade the availability of certain database functions related to replication or maintenance tasks, potentially affecting cluster stability or performance. However, since the vulnerability requires high privileges and affects only specific background workers, the risk to overall system confidentiality and integrity is minimal. Organizations relying heavily on PostgreSQL extensions in critical infrastructure or cloud-native applications may experience service interruptions if exploited. The low CVSS score and absence of known exploits reduce immediate risk, but the presence of high-privileged remote access vectors means insider threats or compromised accounts could leverage this vulnerability. European entities with strict uptime requirements or regulatory mandates for availability should consider this vulnerability in their risk assessments.

Mitigation Recommendations

To mitigate CVE-2023-5870, European organizations should: 1) Apply any available patches or updates from Red Hat promptly once released, as no patch links are currently provided. 2) Restrict and monitor high-privileged remote access to PostgreSQL instances and Red Hat Advanced Cluster Security components to prevent unauthorized use of the pg_cancel_backend role. 3) Audit and limit the use of non-core PostgreSQL extensions, especially those that implement custom background workers, ensuring they are from trusted sources and regularly updated. 4) Implement resource usage monitoring and alerting on PostgreSQL background workers to detect abnormal cancellation signals or resource consumption patterns. 5) Employ network segmentation and access controls to isolate critical database components from less trusted network zones. 6) Conduct regular security reviews and penetration testing focused on privilege escalation and denial of service vectors within database environments. These targeted actions go beyond generic advice by focusing on the specific conditions required for exploitation and the nature of the affected components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-10-31T03:56:58.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3bcb66c7f7acdd3cb5f

Added to database: 10/4/2025, 10:15:24 AM

Last enriched: 11/20/2025, 4:08:17 AM

Last updated: 12/5/2025, 3:28:12 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats