CVE-2023-35001

7.8 HIGH

📋 TL;DR

This vulnerability in the Linux kernel's nftables subsystem allows local users with CAP_NET_ADMIN capability to trigger out-of-bounds read/write operations. It can lead to privilege escalation, denial of service, or information disclosure. Any Linux system using nftables with users having CAP_NET_ADMIN in any namespace is affected.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Kernel versions before specific fixes (varies by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires nftables support and users with CAP_NET_ADMIN capability in any namespace (including containers).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to root, allowing complete control over the system and potential lateral movement.

🟠

Likely Case

Kernel panic causing denial of service, or information disclosure through memory reads.

🟢

If Mitigated

Limited impact if CAP_NET_ADMIN is restricted and proper namespace isolation is enforced.

🌐 Internet-Facing: LOW - Requires local access with CAP_NET_ADMIN, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users with CAP_NET_ADMIN (including containers/namespaces) can exploit it.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access and CAP_NET_ADMIN capability. Proof-of-concept code has been published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by distribution - check vendor advisories

Vendor Advisory: https://www.kernel.org/

Restart Required: Yes

Instructions:

1. Check your distribution's security advisory. 2. Update kernel package using package manager. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict CAP_NET_ADMIN

linux

Remove CAP_NET_ADMIN capability from non-privileged users and containers

setcap -r cap_net_admin /path/to/binary
docker run --cap-drop=NET_ADMIN ...

Disable nftables

linux

Unload nftables kernel module if not required

rmmod nf_tables
echo 'blacklist nf_tables' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Strictly limit users and containers with CAP_NET_ADMIN capability
  • Implement network namespace isolation and monitor for suspicious nftables operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version against your distribution's patched versions: uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops/panic messages
  • Failed nftables rule operations
  • Unexpected nft command executions

Network Indicators:

  • None - local exploitation only

SIEM Query:

process.name="nft" AND user.capabilities contains "cap_net_admin"

🔗 References

📤 Share & Export