CVE-2023-53675

7.1 HIGH

📋 TL;DR

This CVE-2023-53675 is an out-of-bounds read vulnerability in the Linux kernel's SCSI Enclosure Services (SES) driver. It allows attackers to read kernel memory beyond allocated buffers, potentially leaking sensitive information or causing system crashes. Systems running vulnerable Linux kernel versions with SCSI enclosure devices are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific vulnerable versions not explicitly stated in CVE, but patches exist for multiple stable branches
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SCSI enclosure devices to be present and accessible. Virtualized environments with virtual SCSI devices may also be affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory disclosure leading to information leakage, privilege escalation, or denial of service through kernel panic.

🟠

Likely Case

Information disclosure of kernel memory contents or system instability/crashes.

🟢

If Mitigated

Limited impact if proper access controls restrict SCSI device access to trusted users only.

🌐 Internet-Facing: LOW - Requires local access to SCSI devices, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers with access to SCSI enclosure devices could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to interact with SCSI enclosure devices. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel versions with commits: 414418abc19fa4ccf730d273061a426c07a061d6, 4b8cae410472653a59e15af62c57c49b8e0a1201, 584892fd29a41ef424a148118a3103b16b94fb8c, 72021ae61a2bc6ca73cd593e255a10ed5f5dc5e7, 79ec5dd5fb07ecaea2f978c2d7a9f2f3526e4d19

Vendor Advisory: https://git.kernel.org/stable/c/414418abc19fa4ccf730d273061a426c07a061d6

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Restrict SCSI device access

linux

Limit access to SCSI enclosure devices to trusted users only using device permissions

chmod 600 /dev/sg*
chown root:root /dev/sg*

Disable SCSI enclosure support

linux

Remove or blacklist ses kernel module to disable SCSI Enclosure Services

echo 'blacklist ses' >> /etc/modprobe.d/blacklist-ses.conf
rmmod ses

🧯 If You Can't Patch

  • Implement strict access controls on SCSI devices to limit exposure
  • Monitor system logs for unusual SCSI device access or kernel panic events

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with distribution's security advisories. Examine if ses module is loaded: lsmod | grep ses

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update matches patched version. Check that ses module functions normally with SCSI devices.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • SCSI error logs
  • Out-of-bounds access warnings in kernel logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("panic" OR "oops" OR "segfault") AND ("ses" OR "SCSI")

🔗 References

📤 Share & Export