{"id":"CVE-2023-45236","details":"EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This\n vulnerability can be exploited by an attacker to gain unauthorized \naccess and potentially lead to a loss of Confidentiality.","modified":"2026-03-15T22:47:37.831917Z","published":"2024-01-16T16:15:12.820Z","related":["ALSA-2024:4749","ALSA-2024:5297","GHSA-hc6x-cw6p-gj7h","SUSE-SU-2025:0407-1","SUSE-SU-2025:0421-1","SUSE-SU-2025:0503-1","SUSE-SU-2025:0608-1","SUSE-SU-2025:0609-1","SUSE-SU-2025:0690-1","openSUSE-SU-2024:14336-1"],"references":[{"type":"WEB","url":"https://www.kb.cert.org/vuls/id/132380"},{"type":"ADVISORY","url":"https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240307-0011/"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2024/01/16/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tianocore/edk2","events":[{"introduced":"0"},{"last_affected":"8736b8fdca85e02933cdb0a13309de14c9799ece"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"202311"}]}}],"versions":["edk2-stable201808","edk2-stable201811","edk2-stable201903","edk2-stable201905","edk2-stable201908","edk2-stable201911","edk2-stable202002","edk2-stable202005","edk2-stable202008","edk2-stable202011","edk2-stable202102","edk2-stable202105","edk2-stable202108","edk2-stable202108-rc0","edk2-stable202108-rc1","edk2-stable202111","edk2-stable202111-rc1","edk2-stable202202","edk2-stable202202-rc1","edk2-stable202205","edk2-stable202205-rc1","edk2-stable202208","edk2-stable202211","edk2-stable202302","edk2-stable202305","edk2-stable202308","edk2-stable202311"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45236.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}