CVE-2020-15687
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
Una falta de restricciones del control de acceso en el componente Hypervisor del CRN Project (versiones v2.0 y v1.6.1), permite a una entidad maliciosa con acceso root en el espacio de usuario de Service VM, abusar de las Hypercalls de asignación y desasignación de PCIe por medio de ioctls y cargas útiles diseñadas. Este ataque resulta en un estado corrupto y una Denegación de Servicio (DoS) para dispositivos PCIe asignados previamente a la Service VM en tiempo de ejecución
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-07-13 CVE Reserved
- 2020-08-31 CVE Published
- 2024-07-05 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://projectacrn.github.io/2.1/asa.html#addressed-in-acrn-v2-1 | Third Party Advisory | |
https://projectacrn.github.io/latest | Third Party Advisory | |
https://projectacrn.github.io/latest/developer-guides/hld/split-dm.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linuxfoundation Search vendor "Linuxfoundation" | Acrn Search vendor "Linuxfoundation" for product "Acrn" | 1.6.1 Search vendor "Linuxfoundation" for product "Acrn" and version "1.6.1" | - |
Affected
| ||||||
Linuxfoundation Search vendor "Linuxfoundation" | Acrn Search vendor "Linuxfoundation" for product "Acrn" | 2.0 Search vendor "Linuxfoundation" for product "Acrn" and version "2.0" | - |
Affected
|