CVE-2024-8178

The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it.

Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root.  Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.  A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
freebsdCNA
---
---
CISA-ADPADP
9.3 CRITICAL
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
VendorProductVersion
freebsdfreebsd
13.0 ≤
𝑥
< 13.3
freebsdfreebsd
13.3
freebsdfreebsd
13.3:p1
freebsdfreebsd
13.3:p2
freebsdfreebsd
13.3:p3
freebsdfreebsd
13.3:p4
freebsdfreebsd
13.3:p5
freebsdfreebsd
13.4:beta3
freebsdfreebsd
14.0
freebsdfreebsd
14.0:beta5
freebsdfreebsd
14.0:p1
freebsdfreebsd
14.0:p2
freebsdfreebsd
14.0:p3
freebsdfreebsd
14.0:p4
freebsdfreebsd
14.0:p5
freebsdfreebsd
14.0:p6
freebsdfreebsd
14.0:p7
freebsdfreebsd
14.0:p8
freebsdfreebsd
14.0:p9
freebsdfreebsd
14.0:rc3
freebsdfreebsd
14.0:rc4-p1
freebsdfreebsd
14.1
freebsdfreebsd
14.1:p1
freebsdfreebsd
14.1:p2
freebsdfreebsd
14.1:p3
𝑥
= Vulnerable software versions