VMware ESXi Memory Corruption via Unsynced Signed VM Image
CVE-2023-33119 Published on May 6, 2024

Time-of-check Time-of-use (TOCTOU) Race Condition in Hypervisor
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.

NVD

Vulnerability Analysis

CVE-2023-33119 can be exploited with local system access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a TOCTTOU Vulnerability?

The software checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state. This weakness can be security-relevant when an attacker can influence the state of the resource between check and use. This can happen with shared resources such as files, memory, or even variables in multithreaded programs.

CVE-2023-33119 has been classified to as a TOCTTOU vulnerability or weakness.


Products Associated with CVE-2023-33119

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-33119 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Qualcomm, Inc. Snapdragon: qualcomm aqt1000_firmware: qualcomm ar8035_firmware: qualcomm fastconnect_6200_firmware: qualcomm fastconnect_6700_firmware: qualcomm fastconnect_6800_firmware: qualcomm fastconnect_6900_firmware: qualcomm fastconnect_7800_firmware: qualcomm qam8255p_firmware: qualcomm qam8295p_firmware: qualcomm qam8650p_firmware: qualcomm qam8775p_firmware: qualcomm qamsrv1h_firmware: qualcomm qamsrv1m_firmware: qualcomm qca6174a_firmware: qualcomm qca6310_firmware: qualcomm qca6320_firmware: qualcomm qca6335_firmware: qualcomm qca6391_firmware: qualcomm qca6420_firmware: qualcomm qca6421_firmware: qualcomm qca6426_firmware: qualcomm qca6430_firmware: qualcomm qca6431_firmware: qualcomm qca6436_firmware: qualcomm qca6564a_firmware: qualcomm qca6564au_firmware: qualcomm qca6574_firmware: qualcomm qca6574a_firmware: qualcomm qca6574au_firmware: qualcomm qca6584au_firmware: qualcomm qca6595_firmware: qualcomm qca6595au_firmware: qualcomm qca6678aq_firmware: qualcomm qca6696_firmware: qualcomm qca6698aq_firmware: qualcomm qca6797aq_firmware: qualcomm qca8081_firmware: qualcomm qca8337_firmware: qualcomm qca9377_firmware: qualcomm qcc710_firmware: qualcomm qcm5430_firmware: qualcomm qcm6490_firmware: qualcomm qcm8550_firmware: qualcomm qcn6224_firmware: qualcomm qcn6274_firmware: qualcomm qcs5430_firmware: qualcomm qcs6490_firmware: qualcomm qcs8550_firmware: qualcomm qdu1000_firmware: qualcomm qdu1010_firmware: qualcomm qdu1110_firmware: qualcomm qdu1210_firmware: qualcomm qdx1010_firmware: qualcomm qdx1011_firmware: qualcomm qep8111_firmware: qualcomm qfw7114_firmware: qualcomm qfw7124_firmware: qualcomm qru1032_firmware: qualcomm qru1052_firmware: qualcomm qru1062_firmware: qualcomm qsm8350_firmware: qualcomm_video_collaboration_vc3_platform_firmware: qualcomm robotics_rb3_platform_firmware: qualcomm sa6145p_firmware: qualcomm sa6155_firmware: qualcomm sa6155p_firmware: qualcomm sa7255p_firmware: qualcomm sa8150p_firmware: qualcomm sa8155_firmware: qualcomm sa8155p_firmware: qualcomm sa8255p_firmware:

Exploit Probability

EPSS
0.05%
Percentile
14.57%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.