Impact
An out‑of‑bounds write occurs in the virtio PCI transport on Firecracker when a local guest with root privileges modifies virtio queue configuration registers after device activation. The flaw can cause the VMM process to crash, resulting in denial of service, or under specific preconditions such as the use of a custom guest kernel or particular snapshot configurations may allow the guest to execute arbitrary code on the host.
Affected Systems
The vulnerability affects Amazon Firecracker versions 1.13.0 through 1.14.3 and 1.15.0 on both x86_64 and aarch64 architectures. Enterprise customers running these releases on AWS or other platforms are impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability. The EPSS score is less than 1%, and it is not listed in the KEV catalog. The attack is local and requires root privileges within the guest. If the special preconditions are met, host code execution is possible, leading to full system compromise. Otherwise, the most likely outcome is a VMM crash, causing denial of service for the virtual machine it hosts.
OpenCVE Enrichment