ABB M2M Gateway Use-After-Free in embedded Linux Kernel (CVE-2023-32233)

high Tenable OT Security Plugin ID 503258

Synopsis

The remote OT asset is affected by a vulnerability.

Description

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08

http://www.nessus.org/u?310ae51a

http://www.nessus.org/u?ee97cd23

http://www.openwall.com/lists/oss-security/2023/05/15/5

https://bugzilla.redhat.com/show_bug.cgi?id=2196105

http://www.nessus.org/u?38b713d1

http://www.nessus.org/u?eddbb3dc

https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html

https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html

https://news.ycombinator.com/item?id=35879660

https://security.netapp.com/advisory/ntap-20230616-0002/

https://www.debian.org/security/2023/dsa-5402

https://www.openwall.com/lists/oss-security/2023/05/08/4

Plugin Details

Severity: High

ID: 503258

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 5/27/2025

Updated: 5/27/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:abb:sw_firmware, cpe:/o:abb:arm600_firmware

Required KB Items: Tenable.ot/ABB

Exploit Ease: No known exploits are available

Patch Publication Date: 5/8/2023

Vulnerability Publication Date: 5/8/2023

Reference Information

CVE: CVE-2023-32233

CWE: 416

ICSA: 25-105-08