
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-45219 affects Apache CloudStack versions 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1. The vulnerability stems from missing validation checks for KVM-compatible templates and volumes, which allows account users to upload and register templates for deploying instances and volumes as data disks to their existing instances (Apache Advisory, Security Online).
The vulnerability is rated as 'Important' with a CVSS v3.1 Base Score of 8.5 (HIGH) and vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H. The issue arises from insufficient validation of KVM-compatible templates and volumes, which can be exploited in KVM-based environments (ASEC, NVD).
The exploitation of this vulnerability can lead to compromise of resource integrity and confidentiality, data loss, denial of service, and availability issues in KVM-based infrastructure managed by CloudStack. Attackers can potentially gain access to host filesystems through malicious instances or attached volumes (Apache Advisory, ShapeBlue Advisory).
Users are strongly recommended to upgrade to Apache CloudStack versions 4.18.2.4 or 4.19.1.2 or later. Additionally, administrators can scan and validate user-uploaded or registered KVM-compatible templates and volumes to ensure they are flat files without additional features. A validation script can be run on secondary storage to check for potential compromised disks (Apache Advisory, ShapeBlue Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."