The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-6377

CVE-2023-6377: Redhat Enterprise Linux XKB Escalation Flaw

CVE-2023-6377 is a privilege escalation vulnerability in Redhat Enterprise Linux Eus affecting the xorg-server XKB button actions. This flaw enables local privilege escalation or remote code execution. Learn the details.

Published: January 28, 2026

CVE-2023-6377 Overview

A memory safety vulnerability has been discovered in the X.Org X Server affecting XKB (X Keyboard Extension) button action handling. The flaw occurs when querying or changing XKB button actions, such as transitioning input from a touchpad to a mouse. This improper handling results in out-of-bounds memory reads and writes, which can be leveraged for local privilege escalation or, in configurations where X11 forwarding is enabled, potentially remote code execution.

Critical Impact

This vulnerability allows attackers to achieve local privilege escalation through out-of-bounds memory access, with remote code execution possible via X11 forwarding scenarios. Systems running X.Org X Server, XWayland, or TigerVNC are at risk.

Affected Products

  • X.Org X Server (all versions prior to patch)
  • X.Org XWayland (all versions prior to patch)
  • TigerVNC
  • Red Hat Enterprise Linux 6.0, 7.0, 8.0, 9.0
  • Red Hat Enterprise Linux EUS 9.2
  • Debian Linux 10.0, 11.0, 12.0

Discovery Timeline

  • December 13, 2023 - CVE-2023-6377 published to NVD
  • August 18, 2025 - Last updated in NVD database

Technical Details for CVE-2023-6377

Vulnerability Analysis

The vulnerability resides in the XKB extension of the X.Org X Server, specifically in the handling of button action transitions between different input devices. When a user or application queries or modifies XKB button actions—for instance, when switching input context from a touchpad to a mouse—the server fails to properly validate memory boundaries. This leads to out-of-bounds read and write operations that can corrupt adjacent memory regions.

The flaw is classified under CWE-125 (Out-of-bounds Read), though the actual impact extends to memory writes as well. The local attack vector requires an authenticated attacker to interact with the X server, but the low complexity and lack of user interaction requirements make exploitation relatively straightforward once access is obtained.

Root Cause

The root cause lies in improper bounds checking within the XKB button action processing code. When the X server handles device transitions or button action queries, it calculates memory offsets without adequate validation of array indices. This allows memory operations to occur outside the intended buffer boundaries, corrupting heap or stack memory depending on the specific code path triggered.

Attack Vector

Exploitation requires local access to the X server, typically through an authenticated session. An attacker can craft specific XKB requests that trigger the vulnerable code path during device input transitions. The out-of-bounds memory access can be leveraged to:

  1. Overwrite critical data structures to gain elevated privileges
  2. Leak sensitive memory contents for information disclosure
  3. Achieve arbitrary code execution by corrupting function pointers or return addresses

In environments where X11 forwarding is configured (common in SSH sessions to remote servers), this local vulnerability can be exploited remotely by an attacker who has established an X11-forwarded session, extending the attack surface significantly.

The vulnerability is particularly concerning for multi-user systems, virtualization hosts running VNC servers, and enterprise environments where X11 forwarding may be enabled for administrative convenience.

Detection Methods for CVE-2023-6377

Indicators of Compromise

  • Unexpected crashes or segmentation faults in X.Org X Server (Xorg) or XWayland processes
  • Anomalous XKB-related requests in X server logs, particularly around device transitions
  • Memory corruption signatures in system logs or crash dumps associated with X server processes
  • Unusual privilege escalation events following X server activity

Detection Strategies

  • Monitor X server logs for repeated XKB button action queries with unusual parameters
  • Implement file integrity monitoring on X server binaries to detect post-exploitation modifications
  • Deploy endpoint detection rules for anomalous memory access patterns in Xorg, Xwayland, and Xvnc processes
  • Audit X11 forwarding configurations and log forwarded session activity

Monitoring Recommendations

  • Enable verbose logging for X server instances to capture XKB extension activity
  • Configure system audit rules to track X server process behavior and privilege changes
  • Monitor for unexpected child processes spawned by X server components
  • Implement memory anomaly detection for graphical session processes

How to Mitigate CVE-2023-6377

Immediate Actions Required

  • Apply vendor-provided security patches for X.Org X Server, XWayland, and TigerVNC immediately
  • Disable X11 forwarding in SSH configurations where not strictly required (X11Forwarding no in sshd_config)
  • Restrict local access to X server sockets using appropriate permissions
  • Consider migrating to Wayland-native compositors where X.Org compatibility is not required

Patch Information

Security patches have been released by multiple vendors. The upstream fix is available in the Freedesktop GitLab Commit (commit 0c1a93d319558fe3ab2d94f51d174b4f93810afd).

Key vendor advisories include:

  • Red Hat Security Advisory RHSA-2023:7886
  • Debian Security Advisory DSA-5576
  • Gentoo GLSA 202401-30

Update using your distribution's package manager:

  • Red Hat/CentOS: sudo yum update xorg-x11-server xwayland tigervnc-server
  • Debian/Ubuntu: sudo apt update && sudo apt upgrade xserver-xorg-core xwayland tigervnc-standalone-server
  • Fedora: sudo dnf update xorg-x11-server xwayland tigervnc-server

Workarounds

  • Disable X11 forwarding on SSH servers by setting X11Forwarding no in /etc/ssh/sshd_config
  • Restrict access to X server sockets using xhost access controls or X authorization mechanisms
  • Isolate systems running vulnerable X server versions from untrusted users
  • Consider using containerization or sandboxing for graphical applications requiring X11
bash
# Disable X11 forwarding in SSH
sudo sed -i 's/^X11Forwarding yes/X11Forwarding no/' /etc/ssh/sshd_config
sudo systemctl restart sshd

# Verify X server package version (RHEL/CentOS)
rpm -qa | grep -E "xorg-x11-server|xwayland|tigervnc"

# Update packages (Debian/Ubuntu)
sudo apt update && sudo apt install --only-upgrade xserver-xorg-core xwayland

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechRedhat Enterprise Linux

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.41%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Technical References
  • Red Hat Security Advisory RHSA-2024:0006

  • Red Hat Security Advisory RHSA-2024:0009

  • Red Hat Security Advisory RHSA-2024:0010

  • Red Hat Security Advisory RHSA-2024:0014

  • Red Hat Security Advisory RHSA-2024:0015

  • Red Hat Security Advisory RHSA-2024:0016

  • Red Hat Security Advisory RHSA-2024:0017

  • Red Hat Security Advisory RHSA-2024:0018

  • Red Hat Security Advisory RHSA-2024:0020

  • Red Hat Security Advisory RHSA-2024:2169

  • Red Hat Security Advisory RHSA-2024:2170

  • Red Hat Security Advisory RHSA-2024:2995

  • Red Hat Security Advisory RHSA-2024:2996

  • Red Hat Security Advisory RHSA-2025:13998

  • Red Hat Bugzilla Report #2253291

  • X.Org Announcement December 2023

  • Openwall OSS-Security Mailing List

  • Debian LTS Announcement 2023/12/08

  • Debian LTS Announcement 2023/12/13

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA 202401-30

  • NetApp Security Advisory NTAP-20240125-0003

  • Debian Security Advisory DSA-5576
  • Vendor Resources
  • Red Hat Security Advisory RHSA-2023:7886

  • Red Hat CVE Details for CVE-2023-6377

  • Freedesktop GitLab Commit
  • Related CVEs
  • CVE-2021-35939: RPM Privilege Escalation Vulnerability

  • CVE-2023-50387: Red Hat Enterprise Linux DNS DoS Attack

  • CVE-2023-6121: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2022-40982: Red Hat Enterprise Linux Info Disclosure
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English