Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7216: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Red Hat Red Hat Enterprise Linux 6

0
Medium
VulnerabilityCVE-2023-7216cvecve-2023-7216
Published: Mon Feb 05 2024 (02/05/2024, 15:12:17 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 6

Description

A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.

AI-Powered Analysis

AILast updated: 10/10/2025, 13:06:53 UTC

Technical Analysis

CVE-2023-7216 is a path traversal vulnerability identified in the CPIO utility included in Red Hat Enterprise Linux 6. The flaw arises because the archiver improperly limits pathname resolution during archive extraction, allowing symlinks within the archive to be followed outside the intended extraction directory. This enables an attacker to craft a malicious archive that, when extracted by a user, can cause files to be written to arbitrary locations on the filesystem. The vulnerability requires the victim to open and extract the specially crafted archive, meaning user interaction is necessary. The attack vector is local or remote with user interaction (AV:L/UI:R), and no privileges are required to trigger the issue. The impact includes potential confidentiality loss (due to overwriting sensitive files), integrity compromise (altering critical files), and availability degradation (disrupting system files). The CVSS v3.1 base score is 5.3, indicating medium severity. No public exploits or active exploitation have been reported yet. The vulnerability primarily affects legacy RHEL 6 systems, which remain in use in some environments due to long-term support or legacy application dependencies. The issue highlights the risk of extracting untrusted archives without proper safeguards.

Potential Impact

For European organizations, especially those in sectors such as government, finance, healthcare, and critical infrastructure that may still operate legacy Red Hat Enterprise Linux 6 systems, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized file writes, potentially allowing attackers to overwrite configuration files, implant malicious code, or disrupt services. This could result in data breaches, system instability, or denial of service conditions. Since exploitation requires user interaction, the risk is somewhat mitigated but remains significant in environments where users frequently handle archive files from untrusted sources. Organizations relying on legacy systems with limited patching options are particularly vulnerable. The impact on confidentiality, integrity, and availability could affect compliance with European data protection regulations such as GDPR if sensitive data is compromised or systems are disrupted.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address this vulnerability. 2. Until patches are deployed, avoid extracting archive files from untrusted or unknown sources on RHEL 6 systems. 3. Implement strict user training and awareness programs to reduce the risk of users opening malicious archives. 4. Use sandboxed or containerized environments for archive extraction to contain potential damage. 5. Employ file integrity monitoring to detect unauthorized changes to critical system files. 6. Consider upgrading from RHEL 6 to a more recent, supported version of Red Hat Enterprise Linux to benefit from improved security features and ongoing support. 7. Restrict user permissions to limit the ability to write files outside designated directories during extraction processes. 8. Monitor system logs for unusual file write activities that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-05T14:21:24.756Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e901b8fd0dca528e8b9a73

Added to database: 10/10/2025, 12:53:12 PM

Last enriched: 10/10/2025, 1:06:53 PM

Last updated: 10/10/2025, 4:16:09 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats