
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-23034 is a vulnerability in the Xen hypervisor that was discovered by Julien Grall of Amazon. The vulnerability affects Xen versions from 3.2 onwards that have XSA-380 fixes applied. The issue stems from a reference counting mechanism introduced for grant mappings in PV guests with IOMMU enabled (Xen Advisory).
The vulnerability occurs when PV guests request two forms of mappings. When both mapping types are in use for an individual mapping, unmapping can be requested in two steps. This causes the reference count to be mistakenly decremented twice, leading to counter underflow and triggering a hypervisor bug check. The vulnerability has a CVSS v3.1 Base Score of 5.5 (MEDIUM) with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability allows malicious guest kernels to mount a Denial of Service (DoS) attack affecting the entire system. The vulnerability specifically impacts x86 systems, while Arm systems are not affected. Only x86 PV guests with access to PCI devices can leverage the vulnerability, while x86 HVM and PVH guests, as well as PV guests without PCI device access, cannot exploit it (Xen Advisory).
Several mitigation strategies are available: 1) Not running PV guests will avoid the vulnerability entirely. 2) For Xen 4.12 and older, not passing through PCI devices to PV guests prevents exploitation. 3) For Xen 4.13 and newer, disabling PCI device pass-through for PV guests by either omitting 'passthrough=...' and 'pci=...' settings or setting 'passthrough=disabled' in xl guest configuration files. 4) From Xen 4.13 onwards, using XSM SILO security policy can mitigate the vulnerability as it only permits guests to communicate with Dom0 (Xen Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."