Vulnerability Details : CVE-2020-2732
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
Vulnerability category: Information leak
Products affected by CVE-2020-2732
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-2732
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-2732
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.3
|
LOW | AV:A/AC:M/Au:S/C:P/I:N/A:N |
4.4
|
2.9
|
NIST | |
6.8
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.3
|
4.0
|
NIST | |
5.8
|
MEDIUM | CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
1.3
|
4.0
|
Oracle |
CWE ids for CVE-2020-2732
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-2732
-
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
[SECURITY] [DLA 2241-2] linux security update
-
https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
[SECURITY] [DLA 2241-1] linux security update
-
https://www.spinics.net/lists/kvm/msg208259.html
[FYI PATCH 0/3] CVE-2020-2732 — Linux KVMPatch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
[SECURITY] [DLA 2242-1] linux-4.9 security update
-
https://linux.oracle.com/errata/ELSA-2020-5543.html
linux.oracle.com | ELSA-2020-5543Third Party Advisory
-
https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Third Party Advisory
-
https://linux.oracle.com/errata/ELSA-2020-5540.html
linux.oracle.com | ELSA-2020-5540Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1805135
Issue Tracking;Third Party Advisory
-
https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
kernel/git/torvalds/linux.git - Linux kernel source treePatch;Third Party Advisory
-
https://linux.oracle.com/errata/ELSA-2020-5542.html
linux.oracle.com | ELSA-2020-5542Third Party Advisory
-
https://www.debian.org/security/2020/dsa-4667
Debian -- Security Information -- DSA-4667-1 linux
-
https://www.openwall.com/lists/oss-security/2020/02/25/3
oss-security - CVE-2020-2732: Nested VMX vulnerabilityMailing List;Third Party Advisory
-
https://www.debian.org/security/2020/dsa-4698
Debian -- Security Information -- DSA-4698-1 linux
Jump to