Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2023-31248 CVSS:7.8
Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by nf_tables use-after-free when using nft_chain_lookup_byid. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2023-3269 CVSS:8.4
Linux Kernel could allow a local attacker to gain elevated privileges on the system, caused by a flaw in the handling of stack expansion in the memory management subsystem. An attacker could exploit this vulnerability to compromise the kernel and gain elevated privileges on the system.
CVE-2023-35001 CVSS:7.8
Linux Kernel could allow a local authenticated attacker to gain elevated privileges on the system, caused by a nf_tables nft_byteorder_eval out-of-bounds read/write. By sending a specially crafted request, an aattacker could exploit this vulnerability to escalate privileges.
Linux
Upgrade to the latest version of Linux Kernel, available from the Kernel Website.