vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49542 | EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality. |
Ubuntu USN |
USN-7894-1 | EDK II vulnerabilities |
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 02 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality. | EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality. |
Fri, 16 Aug 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 |
Status: PUBLISHED
Assigner: TianoCore
Published:
Updated: 2025-11-04T18:17:41.127Z
Reserved: 2023-10-05T20:48:19.879Z
Link: CVE-2023-45236
Updated: 2025-11-04T18:17:41.127Z
Status : Modified
Published: 2024-01-16T16:15:12.820
Modified: 2025-11-04T19:16:01.020
Link: CVE-2023-45236
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN