bhyve virtio_scsi ctl_report_supported_opcodes Arbitrary Write Host Exec
CVE-2024-42416 Published on September 5, 2024

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-42416 is exploitable with local system access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Types

Improper Filtering of Special Elements

The software receives data from an upstream component, but does not filter or incorrectly filters special elements before sending it to a downstream component.

What is an Untrusted pointer offset Vulnerability?

The program performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.

CVE-2024-42416 has been classified to as an Untrusted pointer offset vulnerability or weakness.


Products Associated with CVE-2024-42416

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-42416 are published in FreeBSD:

 

Affected Versions

FreeBSD: freebsd:

Exploit Probability

EPSS
1.00%
Percentile
76.60%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.