// For flags

CVE-2013-7130

nova: Live migration can leak root disk into ephemeral storage

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver in OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, when using KVM live block migration, does not properly create all expected files, which allows attackers to obtain snapshot root disk contents of other users via ephemeral storage.

El método i_create_images_and_backing (también conocido como create_images_and_backing) en el driver libvirt en OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, cuando hace uso de un bloque de migración KVM en vivo, no crea debidamente todos los archivos esperados, lo que permite a atacantes obtener contenido de una instantánea del disco raíz de otros usuarios a través del almacenamiento efímero.

OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances, managing networks, and controlling access through users and projects. It was discovered that the metadata agent in OpenStack Networking was missing an authorization check on the device ID that is bound to a specific port. A remote tenant could guess the instance ID bound to a port and retrieve metadata of another tenant, resulting in information disclosure. Note that only OpenStack Networking setups running neutron-metadata-agent were affected.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-17 CVE Reserved
  • 2014-02-06 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openstack
Search vendor "Openstack"
Compute
Search vendor "Openstack" for product "Compute"
2012.2
Search vendor "Openstack" for product "Compute" and version "2012.2"
-
Affected
Openstack
Search vendor "Openstack"
Compute
Search vendor "Openstack" for product "Compute"
2013.1
Search vendor "Openstack" for product "Compute" and version "2013.1"
-
Affected
Openstack
Search vendor "Openstack"
Compute
Search vendor "Openstack" for product "Compute"
2013.1.1
Search vendor "Openstack" for product "Compute" and version "2013.1.1"
-
Affected
Openstack
Search vendor "Openstack"
Compute
Search vendor "Openstack" for product "Compute"
2013.1.2
Search vendor "Openstack" for product "Compute" and version "2013.1.2"
-
Affected
Openstack
Search vendor "Openstack"
Compute
Search vendor "Openstack" for product "Compute"
2013.1.3
Search vendor "Openstack" for product "Compute" and version "2013.1.3"
-
Affected
Openstack
Search vendor "Openstack"
Grizzly
Search vendor "Openstack" for product "Grizzly"
--
Affected
Openstack
Search vendor "Openstack"
Havana
Search vendor "Openstack" for product "Havana"
--
Affected
Openstack
Search vendor "Openstack"
Icehouse
Search vendor "Openstack" for product "Icehouse"
--
Affected