Language:
Severity: High
ID: 174450
File Name: ubuntu_USN-6025-1.nasl
Version: 1.6
Type: local
Agent: unix
Family: Ubuntu Local Security Checks
Published: 4/19/2023
Updated: 9/27/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 8.9
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2023-1281
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1028-ibm, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1034-aws, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-70-generic-64k, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-70-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-70-lowlatency-64k, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1032-gcp, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-70-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1031-gke, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1036-azure-fde, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1036-azure, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1027-raspi-nolpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1018-gkeop, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1027-raspi, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1033-oracle, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-70-lowlatency, p-cpe:/a:canonical:ubuntu_linux:linux-image-5.15.0-1031-kvm
Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/19/2023
Vulnerability Publication Date: 11/28/2022
Core Impact
Metasploit (Local Privilege Escalation via CVE-2023-0386)
CVE: CVE-2022-4129, CVE-2022-47929, CVE-2022-4842, CVE-2023-0386, CVE-2023-0394, CVE-2023-1073, CVE-2023-1074, CVE-2023-1281, CVE-2023-1652, CVE-2023-26545
USN: 6025-1