
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-34327 is a vulnerability discovered in AMD CPUs manufactured since 2014 that affects Xen's handling of debug mask state in virtual CPUs. The vulnerability was publicly disclosed on October 10, 2023, and affects Xen versions 4.5 and later. The issue specifically involves AMD CPUs with extensions to normal x86 debugging functionality, where an HVM vCPU can incorrectly operate using the debug mask state of a previous vCPU (Xen Advisory).
The vulnerability exists in AMD/Hygon hardware supporting the DBEXT feature, primarily affecting the Steamroller microarchitecture and later models. The issue stems from errors in Xen's handling of guest state related to debug mask functionality. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with a vector of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, any guest (PV or HVM) using Debug Masks normally for its own purposes can cause incorrect behavior in an unrelated HVM vCPU, most likely resulting in a guest crash. The vulnerability primarily affects systems running Xen with AMD processors that support the DBEXT feature (Xen Advisory).
The vulnerability has been patched with updates available for different versions of Xen. For systems that cannot immediately apply the patch, a mitigation strategy involves controlling VM access to the DBEXT feature. HVM VMs which can see the DBEXT feature are not susceptible to running in the wrong state (Xen Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."