vulnerability

FreeBSD: VID-ab437561-47c0-11ee-8e38-002590c1f29c (CVE-2023-3494): FreeBSD -- bhyve privileged guest escape via fwctl

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Aug 31, 2023
Added
Aug 31, 2023
Modified
Dec 10, 2025

Description

Problem Description: The fwctl driver implements a state machine which is executed when the guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Impact: A malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

Solutions

freebsd-upgrade-base-13_2-release-p2freebsd-upgrade-base-13_1-release-p9
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.