CVE-2022-23092

8.8 HIGH

📋 TL;DR

CVE-2022-23092 is a memory corruption vulnerability in lib9p's RWALK message handling that allows a malicious bhyve guest kernel to overwrite host memory. This could lead to arbitrary code execution within the bhyve process, potentially escaping the Capsicum sandbox. Affected systems include FreeBSD with bhyve virtualization and NetApp products using vulnerable lib9p versions.

💻 Affected Systems

Products:
  • FreeBSD
  • NetApp products using lib9p
Versions: FreeBSD 13.0-RELEASE before p5, FreeBSD 13.1-RELEASE before p1, FreeBSD 14.0-CURRENT before July 2022
Operating Systems: FreeBSD
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when bhyve virtualization is running with untrusted guest kernels.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full host compromise via escape from bhyve's Capsicum sandbox leading to root-level code execution on the FreeBSD host.

🟠

Likely Case

Denial of service (bhyve process crash) or limited code execution within the bhyve sandbox.

🟢

If Mitigated

No impact if bhyve is not running or if untrusted guests are not allowed.

🌐 Internet-Facing: LOW - Requires access to bhyve guest management interface which is typically internal.
🏢 Internal Only: HIGH - Malicious guest kernels can exploit this from within virtualized environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires guest kernel compromise first, then exploitation of lib9p from within guest.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FreeBSD 13.0-RELEASE p5, FreeBSD 13.1-RELEASE p1, FreeBSD 14.0-CURRENT after July 2022

Vendor Advisory: https://security.freebsd.org/advisories/FreeBSD-SA-22:12.lib9p.asc

Restart Required: Yes

Instructions:

1. Update FreeBSD using 'freebsd-update fetch install' or compile from patched source. 2. Restart bhyve services and affected virtual machines.

🔧 Temporary Workarounds

Disable bhyve virtualization

all

Stop using bhyve virtualization until systems can be patched.

service vm stop
pkill bhyve

Restrict guest kernel privileges

all

Only run trusted guest kernels with minimal privileges.

🧯 If You Can't Patch

  • Isolate bhyve hosts on separate network segments
  • Implement strict access controls to bhyve management interfaces

🔍 How to Verify

Check if Vulnerable:

Check FreeBSD version with 'uname -a' and compare against vulnerable versions. Verify if bhyve is running with 'ps aux | grep bhyve'.

Check Version:

uname -a

Verify Fix Applied:

Verify FreeBSD version is patched (13.0-RELEASE p5+, 13.1-RELEASE p1+, or 14.0-CURRENT after July 2022). Check that lib9p library has been updated.

📡 Detection & Monitoring

Log Indicators:

  • bhyve process crashes
  • kernel panic messages related to memory corruption
  • unusual guest kernel behavior

Network Indicators:

  • Unexpected network traffic from bhyve guests to host management interfaces

SIEM Query:

source="bhyve.log" AND ("panic" OR "segmentation fault" OR "memory corruption")

🔗 References

📤 Share & Export