CVE-2024-25743
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-25743 (also known as part of "WeSee") is a vulnerability discovered in the Linux kernel through version 6.9, affecting AMD SEV-SNP and AMD SEV-ES systems. The vulnerability allows an untrusted hypervisor to inject virtual interrupts 0 and 14 at any point in time, which can trigger the SIGFPE signal handler in userspace applications (NVD, Ubuntu).

Technical details

The vulnerability stems from the hypervisor's ability to inject external interrupts to CPUs, specifically #VC exceptions. The SEV-SNP system invokes the #VC exception handler in the VM without verifying the authenticity of the root cause. Notably, the VC handler does not validate whether the VM actually executed an instruction that would legitimately trigger a #VC exception. The CVSS v3.1 base score for this vulnerability is 7.1 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N (Red Hat).

Impact

Each malicious #VC injection can trick the handler into emulating an instruction that either writes attacker-controlled data to the VM or leaks sensitive VM data to the hypervisor. This affects scenarios where the hypervisor is not trusted, particularly in Confidential VM setups (SUSE).

Mitigation and workarounds

The vulnerability requires the AMD SEV-SNP Restricted Injection feature for mitigation. However, many affected hypervisor setups used at Cloud Service Providers do not currently offer this feature. Multiple Linux distributions have released security updates to address this vulnerability, including Red Hat Enterprise Linux versions 8 and 9 through various security advisories (Red Hat).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management