Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6622: NULL Pointer Dereference in Red Hat Red Hat Enterprise Linux 8

0
Medium
VulnerabilityCVE-2023-6622cvecve-2023-6622
Published: Fri Dec 08 2023 (12/08/2023, 17:33:55 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.

AI-Powered Analysis

AILast updated: 11/06/2025, 20:59:42 UTC

Technical Analysis

CVE-2023-6622 is a vulnerability identified in the nft_dynset_init() function within the nf_tables component of the Linux kernel used by Red Hat Enterprise Linux 8. The issue is a NULL pointer dereference, which occurs when the kernel attempts to access or dereference a pointer that has not been properly initialized, leading to a kernel panic and system crash. This vulnerability can be triggered by a local attacker who possesses CAP_NET_ADMIN capabilities, a Linux capability that grants network administration privileges. Since nf_tables is responsible for packet filtering and firewalling, exploitation involves manipulating dynamic sets used in firewall rules. The vulnerability does not allow for privilege escalation or data leakage but results in a denial of service by crashing the kernel and causing system unavailability. The CVSS v3.1 score is 5.5 (medium severity), reflecting the local attack vector, low complexity, required privileges, and impact limited to availability. No user interaction is necessary, and no known exploits have been reported in the wild. The vulnerability was published on December 8, 2023, and while no patch links are currently provided, Red Hat is expected to release updates to address this issue. Organizations running Red Hat Enterprise Linux 8 with nf_tables enabled and granting CAP_NET_ADMIN privileges should be aware of this risk.

Potential Impact

For European organizations, this vulnerability primarily threatens availability of systems running Red Hat Enterprise Linux 8, especially those performing critical network functions such as firewalls, routers, or security gateways using nf_tables. A successful exploit could cause kernel panics leading to service outages, impacting business continuity and potentially disrupting critical infrastructure operations. Since exploitation requires CAP_NET_ADMIN privileges, the risk is higher in environments where multiple administrators or automated processes have elevated network privileges. The denial of service could affect data centers, cloud providers, telecom operators, and enterprises relying on Red Hat Linux for secure network management. Although confidentiality and integrity are not impacted, the availability disruption could have cascading effects on dependent services and compliance with European regulations on service uptime and incident reporting. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks or insider threat scenarios.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Red Hat security advisories closely and apply kernel patches promptly once released to fix CVE-2023-6622. 2) Audit and restrict CAP_NET_ADMIN privileges to the minimum necessary users and processes, employing the principle of least privilege. 3) Use role-based access control (RBAC) and multi-factor authentication for administrative accounts to reduce risk of privilege misuse. 4) Employ kernel crash monitoring and automated recovery mechanisms to minimize downtime in case of exploitation. 5) Consider isolating critical network functions on dedicated hosts with limited user access to reduce attack surface. 6) Regularly review firewall and nftables configurations to detect unusual or unauthorized changes that might exploit this vulnerability. 7) Maintain comprehensive logging and alerting on network administration activities to detect potential exploitation attempts early. 8) Test patches and mitigations in staging environments before deployment to production to ensure stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2023-12-08T11:50:45.757Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d0b9008e329e0f8ef0d97

Added to database: 11/6/2025, 8:56:48 PM

Last enriched: 11/6/2025, 8:59:42 PM

Last updated: 12/4/2025, 9:45:14 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats