CVE-2023-41880

CVSS 3.1 Score 5.3 of 10 (medium)

Details

Published Sep 15, 2023
Updated: Sep 21, 2023
CWE ID 193

Summary

CVE-2023-41880 is a vulnerability affecting Wasmtime, a WebAssembly runtime, on x86_64 platforms. Versions 10.0.0 through 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the `i64x2.shr_s` instruction when the shift amount is a constant value above 32. This issue results in incorrect output, with the low 32 bits of the second lane of the vector derived from the low 32 bits of the input vector instead of the high 32 bits. This can cause inconsistencies in any WebAssembly program that utilizes this instruction with a large constant shift amount. The problem does not breach the WebAssembly sandbox, but Wasmtime still considers it a security issue. The flaw was discovered through code fuzzing and versions 10.0.2, 11.0.2, and 12.0.2 have since been patched. Prior to 10.0.0, users are not at risk. The only temporary workaround for unpatched systems is to either scan for the problematic pattern in wasm modules or disable the SIMD proposal for WebAssembly.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-41880 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions