Memory Access Vulnerability in Arm Architecture for Xen Hypervisor
CVE-2022-23033

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
25 January 2022

What is CVE-2022-23033?

This vulnerability allows an attacker with access to a guest operating system running on an Arm architecture to exploit flaws in the p2m pagetable handling within the Xen Hypervisor. Due to improper clearing of pagetable entries, particularly when the valid bit is not set, an attacker can retain access to memory pages even after they are supposed to be freed and reused by Xen for different purposes. By leveraging this flaw, a guest OS may inadvertently retain access to previously allocated memory, potentially leading to unauthorized data access and compromise of both security and stability within the virtualized environment.

Affected Version(s)

xen consult Xen advisory XSA-393

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Dmytro Firsov of EPAM.'}]}}}
.
CVE-2022-23033 : Memory Access Vulnerability in Arm Architecture for Xen Hypervisor