The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-5869

CVE-2023-5869: PostgreSQL RCE Vulnerability

CVE-2023-5869 is a remote code execution vulnerability in PostgreSQL caused by integer overflow during SQL array modification. Authenticated users can exploit this to execute arbitrary code. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: February 11, 2026

CVE-2023-5869 Overview

A critical integer overflow vulnerability has been identified in PostgreSQL that allows authenticated database users to execute arbitrary code on the target system. The flaw exists due to missing overflow checks during SQL array value modification operations. When a remote authenticated user provides specially crafted data during array modification, an integer overflow condition can be triggered that corrupts memory, enabling the attacker to write arbitrary bytes to memory and extensively read the server's memory.

This vulnerability is particularly concerning because it can be exploited by any authenticated database user, regardless of their privilege level within the database. Successful exploitation can lead to complete system compromise, including unauthorized data access, data manipulation, and service disruption.

Critical Impact

Authenticated attackers can achieve arbitrary code execution on PostgreSQL servers through integer overflow during array operations, potentially leading to complete system compromise.

Affected Products

  • PostgreSQL (versions prior to 16.1, 15.5, 14.10, 13.13, 12.17, and 11.22)
  • Red Hat Enterprise Linux 7, 8, and 9 (including EUS, AUS, and TUS variants)
  • Red Hat CodeReady Linux Builder
  • Red Hat Software Collections

Discovery Timeline

  • December 10, 2023 - CVE-2023-5869 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2023-5869

Vulnerability Analysis

This vulnerability exists within PostgreSQL's array handling code, specifically in the routines responsible for modifying SQL array values. PostgreSQL arrays support multi-dimensional structures with variable bounds, and the code responsible for calculating memory requirements during array modification operations fails to properly validate integer arithmetic operations.

When array dimensions or element counts are manipulated to produce values that exceed the maximum representable integer, the calculation wraps around due to integer overflow. This results in a smaller-than-required memory allocation, creating a heap buffer overflow condition when the actual array data is written to the undersized buffer.

The impact of this vulnerability extends beyond simple denial of service. An authenticated attacker can leverage the integer overflow to achieve controlled memory corruption, enabling:

  • Arbitrary code execution - Writing executable code to memory regions
  • Information disclosure - Reading sensitive server memory contents
  • Privilege escalation - Gaining elevated privileges within the database or operating system

Root Cause

The root cause is classified as CWE-190 (Integer Overflow or Wraparound). PostgreSQL's array modification functions perform arithmetic operations on user-controllable array dimension values without adequate bounds checking. When calculating the total memory size required for array operations, the multiplication of array dimensions and element sizes can produce results that overflow 32-bit or 64-bit integer boundaries, causing the calculated size to wrap to a small positive value.

Attack Vector

The attack requires network access to a PostgreSQL server and valid database credentials. The attacker constructs a malicious SQL query containing specially crafted array modification operations with dimension values designed to trigger the integer overflow. The attack does not require elevated database privileges—any authenticated user can exploit this vulnerability.

The exploitation process involves:

  1. Establishing an authenticated connection to the PostgreSQL database
  2. Constructing array operations with carefully calculated dimensions to trigger integer overflow
  3. Causing memory corruption through the undersized buffer allocation
  4. Leveraging the corruption to execute arbitrary code or read sensitive memory
-- Conceptual attack pattern (sanitized)
-- Attacker crafts array modification with overflow-inducing dimensions
-- The array_cat or similar function receives specially crafted input
-- Integer overflow occurs during size calculation, leading to heap corruption
-- See PostgreSQL security advisory for technical details

Detection Methods for CVE-2023-5869

Indicators of Compromise

  • Unusual PostgreSQL crashes or segmentation faults, particularly during array operations
  • Unexpected memory access patterns in PostgreSQL process memory
  • Database queries containing exceptionally large array dimension specifications
  • Error logs showing memory corruption or heap-related failures

Detection Strategies

  • Monitor PostgreSQL logs for unusual error patterns related to array operations and memory allocation failures
  • Implement database activity monitoring to detect queries with abnormally large array operations
  • Deploy endpoint detection solutions capable of identifying memory corruption exploitation attempts
  • Establish baseline metrics for PostgreSQL process behavior and alert on deviations

Monitoring Recommendations

  • Enable comprehensive PostgreSQL logging including statement logging for suspicious query patterns
  • Configure memory monitoring for PostgreSQL processes to detect unusual allocation patterns
  • Implement network-level monitoring to identify potential exploitation attempts from authenticated sessions
  • Use SentinelOne's behavioral AI to detect post-exploitation activities following successful code execution

How to Mitigate CVE-2023-5869

Immediate Actions Required

  • Update PostgreSQL to patched versions: 16.1, 15.5, 14.10, 13.13, 12.17, or 11.22 immediately
  • Review and restrict database user accounts to minimize the number of authenticated users
  • Implement network segmentation to limit access to PostgreSQL servers from untrusted networks
  • Enable enhanced logging to detect exploitation attempts while patches are being applied

Patch Information

PostgreSQL has released security patches addressing this vulnerability across all supported major versions. Organizations should upgrade to the following minimum versions:

  • PostgreSQL 16.x: Upgrade to 16.1 or later
  • PostgreSQL 15.x: Upgrade to 15.5 or later
  • PostgreSQL 14.x: Upgrade to 14.10 or later
  • PostgreSQL 13.x: Upgrade to 13.13 or later
  • PostgreSQL 12.x: Upgrade to 12.17 or later
  • PostgreSQL 11.x: Upgrade to 11.22 or later

For Red Hat Enterprise Linux deployments, apply the relevant security advisories including RHSA-2023:7545, RHSA-2023:7579, and related updates. Refer to the PostgreSQL Security Advisory for complete patching guidance.

Workarounds

  • Restrict network access to PostgreSQL instances using firewall rules to limit exposure to trusted networks only
  • Review and revoke database access for unnecessary user accounts to reduce the authenticated attack surface
  • Implement application-level input validation to limit array sizes before they reach the database
  • Consider deploying a database proxy or Web Application Firewall to filter potentially malicious queries
bash
# Example: Restrict PostgreSQL network access via pg_hba.conf
# Limit connections to specific trusted subnets
# Edit /var/lib/pgsql/data/pg_hba.conf

# TYPE  DATABASE  USER  ADDRESS         METHOD
# Only allow connections from trusted internal network
host    all       all   192.168.1.0/24  scram-sha-256
# Reject all other connections
host    all       all   0.0.0.0/0       reject

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechPostgresql

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability1.20%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-190
  • Technical References
  • Red Hat Security Advisory RHSA-2023:7545

  • Red Hat Security Advisory RHSA-2023:7579

  • Red Hat Security Advisory RHSA-2023:7580

  • Red Hat Security Advisory RHSA-2023:7581

  • Red Hat Security Advisory RHSA-2023:7616

  • Red Hat Security Advisory RHSA-2023:7656

  • Red Hat Security Advisory RHSA-2023:7666

  • Red Hat Security Advisory RHSA-2023:7667

  • Red Hat Security Advisory RHSA-2023:7694

  • Red Hat Security Advisory RHSA-2023:7695

  • Red Hat Security Advisory RHSA-2023:7714

  • Red Hat Security Advisory RHSA-2023:7770

  • Red Hat Security Advisory RHSA-2023:7771

  • Red Hat Security Advisory RHSA-2023:7772

  • Red Hat Security Advisory RHSA-2023:7778

  • Red Hat Security Advisory RHSA-2023:7783

  • Red Hat Security Advisory RHSA-2023:7784

  • Red Hat Security Advisory RHSA-2023:7785

  • Red Hat Security Advisory RHSA-2023:7786

  • Red Hat Security Advisory RHSA-2023:7788

  • Red Hat Security Advisory RHSA-2023:7789

  • Red Hat Security Advisory RHSA-2023:7790

  • Red Hat Security Advisory RHSA-2023:7878

  • Red Hat Security Advisory RHSA-2023:7883

  • Red Hat Security Advisory RHSA-2023:7884

  • Red Hat Security Advisory RHSA-2023:7885

  • Red Hat Security Advisory RHSA-2024:0304

  • Red Hat Security Advisory RHSA-2024:0332

  • Red Hat Security Advisory RHSA-2024:0337

  • Red Hat CVE Analysis CVE-2023-5869

  • Red Hat Bugzilla Report 2247169

  • PostgreSQL Release Announcement 16.1, 15.5, 14.10, 13.3, 12.7, and 11.2

  • Debian LTS Announce 2023-11-07

  • NetApp Security Advisory NTAP-20240119-0003
  • Vendor Resources
  • PostgreSQL Security Analysis CVE-2023-5869
  • Related CVEs
  • CVE-2025-13957: Hard-coded Credentials RCE Vulnerability

  • CVE-2026-2004: PostgreSQL intarray Extension RCE Flaw

  • CVE-2026-2006: PostgreSQL RCE Vulnerability

  • CVE-2024-10979: PostgreSQL PL/Perl RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English