CVE-2021-3626

8.8 HIGH

📋 TL;DR

This vulnerability in Multipass for Windows allows any local process to connect to the control socket and mount host directories into guest VMs, enabling privilege escalation. It affects Windows users running Multipass versions before 1.7.0. Attackers could gain elevated privileges by manipulating mounts from the host system.

💻 Affected Systems

Products:
  • Multipass
Versions: All versions before 1.7.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows version of Multipass. Linux and macOS versions are not vulnerable. The control socket was improperly accessible to all local processes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full administrative privileges on the host system by mounting sensitive directories into a controlled guest VM and extracting credentials or executing arbitrary code.

🟠

Likely Case

Local user escalates privileges to perform unauthorized actions, access restricted files, or compromise other user accounts on the same system.

🟢

If Mitigated

Limited impact if proper access controls restrict local user accounts and monitoring detects unusual mount activity.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any local user or process can exploit this vulnerability to gain elevated privileges on Windows systems running vulnerable Multipass versions.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once an attacker can run code on the system. The vulnerability is well-documented in the public pull request.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.0

Vendor Advisory: https://github.com/canonical/multipass/pull/2150

Restart Required: Yes

Instructions:

1. Stop all Multipass instances. 2. Download and install Multipass 1.7.0 or later from the official repository. 3. Restart the Multipass service. 4. Verify the version with 'multipass version'.

🔧 Temporary Workarounds

Disable Multipass Service

windows

Temporarily disable the Multipass service to prevent exploitation until patching is possible.

Stop-Service -Name Multipass
Set-Service -Name Multipass -StartupType Disabled

Restrict Local User Access

windows

Implement strict access controls to limit which local users can run processes on affected systems.

🧯 If You Can't Patch

  • Remove Multipass from systems where it is not essential for operations
  • Implement network segmentation and restrict lateral movement from potentially compromised systems

🔍 How to Verify

Check if Vulnerable:

Check Multipass version with 'multipass version' command. If version is below 1.7.0, the system is vulnerable.

Check Version:

multipass version

Verify Fix Applied:

Run 'multipass version' and confirm version is 1.7.0 or higher. Test that mounts still work properly for authorized users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual mount operations in Multipass logs
  • Multiple failed authentication attempts to Multipass control socket
  • Processes connecting to Multipass socket from unexpected user accounts

Network Indicators:

  • Local connections to Multipass control socket (typically localhost:XXXX)
  • Unusual network activity from Multipass guest VMs

SIEM Query:

ProcessName="multipass" AND (EventID=4688 OR EventID=4689) AND CommandLine CONTAINS "mount"

🔗 References

📤 Share & Export