CVE-2023-28339
Linux Debian vulnerability analysis and mitigation

Overview

OpenDoas through version 6.8.2 contains a privilege escalation vulnerability (CVE-2023-28339) when TIOCSTI is available, allowing attackers to escalate privileges by sharing a terminal with the original session. The vulnerability was discovered in March 2023. It affects OpenDoas installations on systems where TIOCSTI is enabled, notably on Linux systems prior to kernel 6.2. It's worth noting that TIOCSTI is unavailable in OpenBSD 6.0 and later, making those systems immune to this vulnerability (NVD, Debian Tracker).

Technical details

The vulnerability has a CVSS v3.1 Base Score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The issue stems from the ability to use the TIOCSTI ioctl to inject characters into a terminal's input buffer when sharing a terminal session. This vulnerability exists because OpenDoas does not create a separate pseudo-terminal for privileged sessions, unlike other similar tools that implement the --pty argument for better security (NVD, GitHub Issue).

Impact

When exploited, this vulnerability allows attackers to execute arbitrary commands with elevated privileges by injecting characters into the terminal's input buffer. This can lead to complete system compromise through privilege escalation, particularly in environments where TIOCSTI is available (GitHub Issue).

Mitigation and workarounds

The primary mitigation is to upgrade to Linux kernel 6.2 or later where TIOCSTI can be disabled. For systems that cannot be upgraded, administrators can disable TIOCSTI functionality through kernel configuration (CONFIGLEGACYTIOCSTI). OpenBSD users are not affected as TIOCSTI is unavailable in OpenBSD 6.0 and later (NVD).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66570CRITICAL10
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoDec 05, 2025
CVE-2025-66471HIGH8.9
  • PythonPython
  • urllib3
NoYesDec 05, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-pure-java
NoYesDec 05, 2025
CVE-2025-66577MEDIUM5.3
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoDec 05, 2025
CVE-2025-66549LOW2.4
  • Linux DebianLinux Debian
  • nextcloud-desktop
NoYesDec 05, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management