Cyber Posture

CVE-2023-52975

High

Published: 27 March 2025

Published
27 March 2025
Modified
01 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2023-52975 is a use-after-free (UAF) vulnerability in the Linux kernel's iSCSI TCP implementation within the SCSI subsystem. The issue occurs during an iSCSI session logout, where concurrent access to the shost ipaddress attribute by another task can trigger a UAF, as detected by KASAN. This leads to invalid memory access, such as attempting to acquire a spinlock on freed memory, affecting Linux kernels that support iSCSI over TCP, particularly in environments using software iSCSI initiators.

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Exploitation involves creating an iSCSI session via netlink messages, triggering a logout in one task to free the session structure, while simultaneously reading the ipaddress sysfs attribute in another task, such as via a tool like 'cat'. Successful exploitation can result in high impacts on confidentiality, integrity, and availability, potentially leading to kernel crashes, data corruption, or arbitrary code execution, as indicated by the CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Mitigation requires applying upstream kernel patches, such as the fixes committed in stable trees at https://git.kernel.org/stable/c/0af745fddefbd56198f4f35eb309215ee5f9e21e, https://git.kernel.org/stable/c/17b738590b97fb3fc287289971d1519ff9b875a1, https://git.kernel.org/stable/c/6f1d64b13097e85abda0f91b5638000afc5f9a06, and https://git.kernel.org/stable/c/8859687f5b242c0b057461df0a9ff51d5500783b. Security practitioners should update affected Linux distributions and kernels to versions incorporating these commits, and consider disabling iSCSI TCP if not required.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.2 · ≤ 5.10.248 · 5.11 — 5.15.93 · 5.16 — 6.1.11

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local kernel use-after-free vulnerability enabling arbitrary code execution by low-privileged attackers, directly facilitating privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References