| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Xen up to 4.11.x and classified as critical. Impacted is an unknown function of the component DEBUGCTL MSR. This manipulation causes access control. This vulnerability is tracked as CVE-2018-15468. The attack is restricted to local execution. No exploit exists. It is recommended to apply a patch to fix this issue.
Details
A vulnerability has been found in Xen up to 4.11.x (Virtualization Software) and classified as critical. Affected by this vulnerability is an unknown part of the component DEBUGCTL MSR. The manipulation with an unknown input leads to a access control vulnerability. The CWE definition for the vulnerability is CWE-264. As an impact it is known to affect availability. The summary by CVE is:
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
The bug was discovered 08/14/2018. The weakness was disclosed 08/17/2018 by Matthew Daley (Website). It is possible to read the advisory at xenbits.xen.org. This vulnerability is known as CVE-2018-15468 since 08/17/2018. Attacking locally is a requirement. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1068 according to MITRE ATT&CK.
The vulnerability scanner Nessus provides a plugin with the ID 112157 (Xen Project MSR_DEBUGCTL 'Branch Trace Store' DoS (XSA-269)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Misc. and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 171690 (SUSE Enterprise Linux Security Update for xen (SUSE-SU-2018:3490-1)).
Applying a patch is able to eliminate this problem. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (112157) and SecurityFocus (BID 106182†). The entries VDB-107985, VDB-122910, VDB-123008 and VDB-123009 are pretty similar. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.0VulDB Meta Temp Score: 5.8
VulDB Base Score: 6.0
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.0
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 112157
Nessus Name: Xen Project MSR_DEBUGCTL 'Branch Trace Store' DoS (XSA-269)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
08/14/2018 🔍08/14/2018 🔍
08/17/2018 🔍
08/17/2018 🔍
08/17/2018 🔍
08/18/2018 🔍
08/28/2018 🔍
12/07/2018 🔍
03/16/2020 🔍
Sources
Advisory: xenbits.xen.orgResearcher: Matthew Daley
Status: Confirmed
CVE: CVE-2018-15468 (🔍)
GCVE (CVE): GCVE-0-2018-15468
GCVE (VulDB): GCVE-100-123007
SecurityFocus: 106182 - Xen Multiple Privilege Escalation and Denial of Service Vulnerabilities
See also: 🔍
Entry
Created: 08/18/2018 10:55Updated: 03/16/2020 14:53
Changes: 08/18/2018 10:55 (71), 03/16/2020 14:53 (6)
Complete: 🔍
Cache ID: 216:F73:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.