CVE-2023-30612

Malicious HTTP requests could close arbitrary opening file descriptors in cloud-hypervisor

Description

Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only.

Categories

4.0
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.05%
Vendor Advisory github.com
Affected: cloud-hypervisor cloud-hypervisor
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-30612?
CVE-2023-30612 has been scored as a medium severity vulnerability.
How to fix CVE-2023-30612?
To fix CVE-2023-30612, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-30612 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-30612 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-30612?
CVE-2023-30612 affects cloud-hypervisor cloud-hypervisor.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.