CVE-2023-21948

7.8 HIGH

📋 TL;DR

This vulnerability in Oracle Solaris 10 allows a low-privileged local attacker to gain complete control over the system. It affects users running Oracle Solaris 10 with default configurations. Successful exploitation leads to full system compromise.

💻 Affected Systems

Products:
  • Oracle Solaris
Versions: 10
Operating Systems: Oracle Solaris
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Oracle Solaris 10. Requires attacker to have local shell access with any user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, allowing data theft, system destruction, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation from low-privileged user to root, enabling unauthorized access to sensitive data and system resources.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and privilege separation is enforced.

🌐 Internet-Facing: LOW (requires local access, not remotely exploitable)
🏢 Internal Only: HIGH (any authenticated local user can potentially exploit this vulnerability)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Described as 'easily exploitable' by Oracle. Requires authenticated local access but low technical complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle CPU April 2023

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2023.html

Restart Required: Yes

Instructions:

1. Review Oracle CPU April 2023 advisory. 2. Download appropriate patches for Solaris 10. 3. Apply patches using Solaris patch management tools. 4. Reboot system as required.

🔧 Temporary Workarounds

Restrict Local User Access

all

Limit shell access to trusted users only and implement strict privilege separation

# Review /etc/passwd and /etc/shadow for unnecessary accounts
# Implement role-based access control (RBAC) policies
# Use sudo with minimal privileges

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts
  • Monitor for privilege escalation attempts and unusual root activity

🔍 How to Verify

Check if Vulnerable:

Check Solaris version with 'uname -a' and verify if running Solaris 10 without April 2023 patches

Check Version:

uname -a

Verify Fix Applied:

Check patch installation with 'showrev -p' and verify April 2023 CPU patches are applied

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unusual root activity from non-admin users
  • Failed sudo/su attempts followed by successful privilege gain

Network Indicators:

  • N/A (local exploit only)

SIEM Query:

source="solaris" AND (event_type="privilege_escalation" OR user="root" AND process!="authorized_process")

🔗 References

📤 Share & Export