Download our ungated guide to high-quality penetration testing.
If you are currently utilizing Xen, KVM or QEMU virtualization products you need to apply patches. VMware and Microsoft Hyper-V virtualization products are not affected.
This blog post was updated to reflect the now-assigned CVSS score of 7.7 (High).
A security researcher from Crowdstrike has discovered a software flaw in the virtual floppy drive code in QEMU’s virtual floppy disk controller. This vulnerable code is present by default on Windows, Linux and OSX hosts running the virtualization products Xen, KVM (Kernel-Based Virtualization not Keyboard-Video-Mouse) and the QEMU client whether or not virtual floppy drives are used. This vulnerability has been present since 2004 and affects both x86 and x86-64 guest instances. In order to exploit this vulnerability, an attacker must have gained access to the virtual machine guest. This is not remotely exploitable, instead an attacker would have to first compromise the guest virtual machine.If successfully exploited, this vulnerability could allow an attacker to escape from the virtual environment and execute code on the host system. Theoretically, a successful attack could also allow access to other systems on the host’s network.At the time of this advisory, there have been no reports of successful attacks and there is no publicly available exploit code. Vendors have begun releasing patches for this. Please see the links section below.This vulnerability has been assigned a 7.7 (High) CVSS score. In this case a 7.7 CVSS score means that the impact of the vulnerability if high, however, the exploitability is much lower due to not being remotely exploitable. Learn more at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 and https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456.
CVSS, the Common Vulnerability Scoring System, is an industry standard mechanism used to assess the severity of computer security vulnerabilities and works with a scale from 1 -10. More information about the CVSS system can be found at https://www.first.org/cvss/faq.
If you have questions regarding this notice or about this vulnerability please call us at 734-827-1400, option 3 or email support@networksgroup.com.
Topics: Threat Hunting, Vulnerability Management, Threat Management, Threat Advisory
Security news, tips, webinars, and more straight to your inbox.