The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-2162

CVE-2023-2162: Linux Kernel Use-After-Free Vulnerability

CVE-2023-2162 is a use-after-free flaw in the Linux Kernel SCSI subsystem that enables attackers to leak kernel internal information. This article covers technical details, affected versions, security impact, and mitigation.

Published: January 28, 2026

CVE-2023-2162 Overview

CVE-2023-2162 is a use-after-free vulnerability discovered in the Linux Kernel's SCSI sub-component, specifically within the iscsi_sw_tcp_session_create function located in drivers/scsi/iscsi_tcp.c. This memory corruption flaw allows a local attacker to leak sensitive kernel internal information, potentially exposing critical system data that could be leveraged for further exploitation.

Critical Impact

Local attackers with low privileges can exploit this use-after-free condition to read sensitive kernel memory, potentially disclosing kernel addresses, cryptographic material, or other privileged information that could facilitate privilege escalation attacks.

Affected Products

  • Linux Kernel versions prior to the security patch
  • Linux Kernel 6.2 (including release candidates RC1 through RC5)
  • Debian-based distributions using vulnerable kernel versions

Discovery Timeline

  • April 19, 2023 - CVE-2023-2162 published to NVD
  • March 19, 2025 - Last updated in NVD database

Technical Details for CVE-2023-2162

Vulnerability Analysis

This use-after-free vulnerability (CWE-416) occurs in the iSCSI software TCP session creation pathway within the Linux Kernel. The flaw exists because memory is accessed after it has been freed during the iSCSI session initialization process. When the iscsi_sw_tcp_session_create function handles session creation, improper memory management can result in references to freed memory objects.

The vulnerability requires local access to exploit, meaning an attacker must already have some level of access to the target system. While this limits the attack surface compared to remotely exploitable flaws, the ability to leak kernel memory makes this vulnerability significant for local privilege escalation chains.

Root Cause

The root cause lies in improper memory lifecycle management within the iSCSI TCP session creation code. When a session is created, certain memory structures may be freed prematurely while still being referenced by other parts of the code. This creates a dangling pointer situation where subsequent operations attempt to read from memory that has already been deallocated and potentially reallocated for other purposes.

The SCSI subsystem's handling of iSCSI software TCP sessions does not properly synchronize the freeing of session-related structures with their usage, leading to a temporal safety violation where freed memory is accessed.

Attack Vector

The attack vector is local, requiring an attacker to have local access to the vulnerable system. The exploitation involves triggering the vulnerable code path in iscsi_sw_tcp_session_create to cause the kernel to access freed memory. Since no user interaction is required and the attack complexity is low, an attacker with basic local privileges can reliably trigger the vulnerability.

The information disclosed through this vulnerability could include kernel memory layout information (useful for bypassing KASLR), kernel data structures, or other sensitive information stored in kernel memory. This leaked data could be combined with other vulnerabilities to achieve privilege escalation.

Detection Methods for CVE-2023-2162

Indicators of Compromise

  • Unusual access patterns to iSCSI-related kernel functions from unprivileged processes
  • Unexpected kernel memory access errors or warnings in system logs related to the SCSI subsystem
  • Abnormal iSCSI session creation activity from non-administrative users
  • Kernel oops or warnings referencing iscsi_sw_tcp_session_create or related functions

Detection Strategies

  • Monitor kernel logs (dmesg, /var/log/kern.log) for use-after-free warnings or SCSI subsystem errors
  • Implement kernel address sanitizer (KASAN) on development and test systems to detect memory safety violations
  • Deploy endpoint detection solutions capable of monitoring kernel-level behavior anomalies
  • Review audit logs for unexpected iSCSI-related system calls from unauthorized processes

Monitoring Recommendations

  • Enable comprehensive kernel logging for the SCSI subsystem to capture anomalous behavior
  • Configure SentinelOne agents to monitor for suspicious local privilege escalation attempts
  • Implement file integrity monitoring on critical kernel modules and iSCSI configuration files
  • Set up alerts for failed or unusual iSCSI session creation attempts

How to Mitigate CVE-2023-2162

Immediate Actions Required

  • Update the Linux Kernel to a patched version that addresses CVE-2023-2162
  • Review and restrict local user access to minimize the attack surface for local exploitation
  • Apply vendor-provided security patches from distribution maintainers (Debian, Red Hat, Ubuntu, etc.)
  • Consider disabling iSCSI functionality if not required in your environment

Patch Information

Patches for this vulnerability have been released through the Linux kernel security team and downstream distributions. The Linux SCSI Mailing List Post contains details about the fix. Additionally, Debian has released advisories addressing this vulnerability for their supported distributions, as documented in the Debian LTS Advisory May 2023.

Organizations should check their distribution's security advisories and apply the appropriate kernel updates. For systems running custom-compiled kernels, ensure you are using a kernel version that includes the fix for this use-after-free condition.

Workarounds

  • Disable the iscsi_tcp kernel module if iSCSI functionality is not required: modprobe -r iscsi_tcp
  • Restrict local user access to systems where the vulnerability cannot be immediately patched
  • Implement strict access controls and the principle of least privilege to limit potential attackers' capabilities
  • Use kernel security modules (SELinux, AppArmor) to restrict access to iSCSI-related system calls
bash
# Disable the vulnerable iSCSI TCP module if not needed
sudo modprobe -r iscsi_tcp

# Blacklist the module to prevent automatic loading
echo "blacklist iscsi_tcp" | sudo tee /etc/modprobe.d/blacklist-iscsi-tcp.conf

# Update initramfs to apply the blacklist
sudo update-initramfs -u

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-416
  • Technical References
  • Debian LTS Advisory May 2023

  • Debian LTS Advisory May 2023
  • Vendor Resources
  • Linux SCSI Mailing List Post
  • Related CVEs
  • CVE-2026-31745: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43048: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43049: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-43056: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English