Vulnerability Details : CVE-2023-24833
A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2023-24833
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 33 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-24833
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2023-24833
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: cve-assign@fb.com (Secondary)
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-24833
-
https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80
Re-sync with internal repository (#908) · facebook/hermes@a6dcafe · GitHubPatch
-
https://www.facebook.com/security/advisories/cve-2023-24833
CVE-2023-24833Patch;Vendor Advisory
Products affected by CVE-2023-24833
- cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*