The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-45231

CVE-2023-45231: Tianocore EDK2 Information Disclosure Flaw

CVE-2023-45231 is an information disclosure vulnerability in Tianocore EDK2's Network Package caused by an out-of-bounds read when processing Neighbor Discovery Redirect messages. This article covers technical details, impact, and mitigation.

Published: February 4, 2026

CVE-2023-45231 Overview

CVE-2023-45231 is an out-of-bounds read vulnerability affecting EDK2's Network Package. The flaw occurs when processing IPv6 Neighbor Discovery Redirect messages, allowing an attacker on an adjacent network to read memory beyond intended buffer boundaries. This vulnerability can be exploited to gain unauthorized access to sensitive information, potentially leading to a loss of confidentiality.

This vulnerability is part of a collection of flaws collectively known as "PixieFail," which affects the network stack in UEFI firmware implementations. EDK2 (EFI Development Kit II) is the open-source reference implementation of the UEFI specification, widely used across the industry in firmware for servers, workstations, and embedded systems.

Critical Impact

Attackers on an adjacent network can exploit this out-of-bounds read vulnerability to access sensitive memory contents, potentially exposing confidential data or aiding in further exploitation of the affected system.

Affected Products

  • Tianocore EDK2 (all versions prior to security fix)
  • Systems using EDK2-based UEFI firmware with IPv6 PXE boot enabled
  • Enterprise servers and workstations with vulnerable network stack implementations

Discovery Timeline

  • January 16, 2024 - CVE-2023-45231 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2023-45231

Vulnerability Analysis

This vulnerability is classified as CWE-125 (Out-of-Bounds Read). The flaw resides in EDK2's network stack implementation, specifically within the code responsible for parsing IPv6 Neighbor Discovery Protocol (NDP) Redirect messages. When the network stack receives a malformed or specially crafted Redirect message, it fails to properly validate the message boundaries before reading data, resulting in memory access beyond the allocated buffer.

The attack requires adjacent network access, meaning the attacker must be on the same network segment as the vulnerable system. No privileges or user interaction are required to exploit this vulnerability. While the vulnerability does not allow modification of data or cause denial of service directly, the information disclosure could expose sensitive memory contents that may facilitate further attacks.

Root Cause

The root cause of CVE-2023-45231 lies in insufficient bounds checking within the Neighbor Discovery Redirect message processing logic. When parsing the options field of an NDP Redirect message, the code does not adequately validate the length fields before reading option data. This allows a malicious actor to craft messages with incorrect length values that cause the parser to read beyond the message buffer into adjacent memory regions.

The vulnerability exists in the pre-boot environment during PXE network boot operations, where UEFI firmware processes network traffic to download boot images. This early-stage execution context means the vulnerability affects systems before the operating system's security controls are active.

Attack Vector

The attack vector for CVE-2023-45231 requires an attacker to have adjacent network access to the target system. The attack scenario typically involves:

  1. The attacker positions themselves on the same network segment as the target system
  2. The target system initiates a PXE boot or otherwise uses the vulnerable EDK2 network stack
  3. The attacker sends crafted IPv6 Neighbor Discovery Redirect messages to the target
  4. The vulnerable parsing code reads memory beyond the intended buffer boundaries
  5. Sensitive memory contents are potentially exposed to the attacker through subsequent network responses or side-channel observations

The vulnerability mechanism involves improper handling of the Redirect message option parsing. When a Redirect message is received, the parsing function iterates through the options field. A malformed option with an incorrect length value can cause the parser to read data from memory locations outside the allocated buffer. For detailed technical information, see the GitHub Security Advisory and the PixieFail Proof of Concepts.

Detection Methods for CVE-2023-45231

Indicators of Compromise

  • Unusual IPv6 Neighbor Discovery Redirect messages with malformed option length fields observed on the network
  • Unexpected network traffic patterns during PXE boot operations
  • Systems experiencing anomalous behavior during pre-boot network initialization
  • Evidence of adjacent network reconnaissance targeting systems during boot sequences

Detection Strategies

  • Deploy network monitoring to detect malformed IPv6 NDP Redirect messages with suspicious option lengths
  • Monitor for unusual traffic patterns on PXE boot VLANs and network segments
  • Implement deep packet inspection rules to identify PixieFail-related attack signatures
  • Review UEFI firmware versions across infrastructure to identify vulnerable EDK2 implementations

Monitoring Recommendations

  • Enable verbose logging on network switches for IPv6 NDP traffic in data center environments
  • Configure IDS/IPS rules to alert on malformed Neighbor Discovery Protocol messages
  • Monitor for unexpected PXE boot attempts from systems that should boot from local storage
  • Establish baseline network behavior for pre-boot environments to detect anomalies

How to Mitigate CVE-2023-45231

Immediate Actions Required

  • Update EDK2-based UEFI firmware to the latest patched version from your hardware vendor
  • Disable IPv6 PXE boot functionality if not required for operations
  • Isolate PXE boot networks and restrict access to trusted management systems only
  • Review and apply vendor-specific firmware updates addressing the PixieFail vulnerabilities

Patch Information

Tianocore has released security updates to address this vulnerability. Organizations should obtain patched firmware from their respective hardware vendors, as EDK2 code is incorporated into vendor-specific firmware builds. Refer to the GitHub Security Advisory GHSA-hc6x-cw6p-gj7h for upstream patch details.

Additional vendor advisories:

  • NetApp Security Advisory
  • Fedora Package Announcement
  • CERT Vulnerability Note VU#132380

Workarounds

  • Disable IPv6 support in UEFI firmware if IPv6 PXE boot is not required
  • Implement network segmentation to isolate PXE boot traffic from general network access
  • Deploy network access controls to restrict which systems can send traffic to PXE boot segments
  • Consider using IPv4-only PXE boot configurations until firmware updates are applied
bash
# Example: Disable IPv6 PXE boot in UEFI settings (vendor-specific)
# Access UEFI setup utility during boot and navigate to:
# Network Stack Configuration -> IPv6 PXE Support -> Disabled
# 
# For systems using efibootmgr on Linux, review boot options:
efibootmgr -v | grep -i pxe
# 
# Network segmentation example - isolate PXE VLAN (switch configuration varies by vendor)
# Ensure PXE boot VLAN is only accessible from trusted management systems

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechTianocore

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.13%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-125
  • Technical References
  • Packet Storm PoC Submission

  • OpenWall OSS Security Update

  • Fedora Package Announcement

  • NetApp Security Advisory NTAP-20240307-0011

  • Debian LTS Announcement

  • CERT Vulnerability ID 132380
  • Vendor Resources
  • GitHub Security Advisory GHSA-hc6x-cw6p-gj7h
  • Related CVEs
  • CVE-2023-45236: Tianocore EDK2 Information Disclosure Flaw

  • CVE-2023-45229: Tianocore EDK2 Information Disclosure Flaw

  • CVE-2023-45235: Tianocore EDK2 Buffer Overflow Vulnerability

  • CVE-2023-45234: Tianocore EDK2 Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English