Vulnerability Details : CVE-2023-2861
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-2861
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-2861
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-2861
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
1.8
|
5.2
|
NIST | |
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
0.8
|
5.2
|
Fedora Project |
CWE ids for CVE-2023-2861
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: patrick@puiterwijk.org (Secondary)
References for CVE-2023-2861
-
https://security.netapp.com/advisory/ntap-20240229-0002/
CVE-2023-2861 QEMU Vulnerability in NetApp Products | NetApp Product Security
-
https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
[SECURITY] [DLA 3759-1] qemu security update
-
https://security.netapp.com/advisory/ntap-20240125-0005/
CVE-2023-2861 QEMU Vulnerability in NetApp Products | NetApp Product Security
-
https://access.redhat.com/security/cve/CVE-2023-2861
CVE-2023-2861- Red Hat Customer PortalVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2219266
2219266 – (CVE-2023-2861) CVE-2023-2861 QEMU: 9pfs: improper access control on special filesIssue Tracking;Patch
Jump to