Xen Hypervisor Vulnerability in Shadow Paging of PCI Devices
CVE-2022-42335

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
25 April 2023

What is CVE-2022-42335?

The vulnerability in the Xen Hypervisor arises from inadequate validation checks in the hypervisor routines that handle shadow paging. This issue allows a guest operating system with access to a PCI device to manipulate shadow page entries, potentially enabling it to direct the hypervisor to access arbitrary memory locations. Such behavior could lead to unauthorized actions outside the guest's intended memory space, underscoring the critical need for patching and security measures in environments relying on shadow mode for address translation when Hardware Assisted Paging isn't an option.

Affected Version(s)

xen consult Xen advisory XSA-430

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

{'credit_data': {'description': {'description_data': [{'lang': 'eng', 'value': 'This issue was discovered by Roger Pau Monné of XenServer.'}]}}}
.
CVE-2022-42335 : Xen Hypervisor Vulnerability in Shadow Paging of PCI Devices