Xen Hypervisor Vulnerability in Shadow Paging of PCI Devices
CVE-2022-42335
7.8HIGH
What is CVE-2022-42335?
The vulnerability in the Xen Hypervisor arises from inadequate validation checks in the hypervisor routines that handle shadow paging. This issue allows a guest operating system with access to a PCI device to manipulate shadow page entries, potentially enabling it to direct the hypervisor to access arbitrary memory locations. Such behavior could lead to unauthorized actions outside the guest's intended memory space, underscoring the critical need for patching and security measures in environments relying on shadow mode for address translation when Hardware Assisted Paging isn't an option.
Affected Version(s)
xen consult Xen advisory XSA-430
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Roger Pau Monné of XenServer.'}]}}}