Technical Severity
HIGHCVSS v3.1 Metrics
8.8
/ 10
Minimal Risk
Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitation Likelihood
EPSS Prediction
68.10
%
Predictive Probability
Percentile Rank
98.6
th
Documented as more likely to be exploited than 98.6% of known CVEs.
Detection Date
Sep 15, 2022
Remediation Due
Oct 06, 2022
CISA Catalog Active
Threat Analysis
The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation.
Remediation Directive
Apply updates per vendor instructions.
External Intelligence
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8404663f81d212918ff85f493649a7991209fa04
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8404663f81d212918ff85f493649a7991209fa04
NVD
National Vulnerability Database
https://nvd.nist.gov/vuln/detail/CVE-2013-6282