CVE-2022-36648

10.0 CRITICAL

📋 TL;DR

This CVE describes a vulnerability in QEMU's hardware emulation where a malformed program executed in a guest OS could crash the host QEMU process and potentially allow code execution on the host. It affects QEMU versions 7.0.0 and earlier when using the rocker device model. Note that this vulnerability has been disputed by multiple third parties as not valid for typical virtualization use cases.

💻 Affected Systems

Products:
  • QEMU
Versions: 7.0.0 and earlier
Operating Systems: Linux, Windows, macOS - any OS running QEMU
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if rocker device model is enabled. The rocker device is not enabled by default in QEMU and is considered experimental/development feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker from guest OS achieves full host compromise with root privileges, potentially accessing all virtual machines and host resources.

🟠

Likely Case

Guest OS crash or host QEMU process crash leading to denial of service for all virtual machines running on that host.

🟢

If Mitigated

Minimal impact if rocker device is not enabled or proper isolation controls are in place.

🌐 Internet-Facing: LOW - Requires access to guest OS first, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or compromised guest VMs within the environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires guest OS access and ability to execute malformed programs. The vulnerability has been disputed by multiple parties as not valid for production virtualization scenarios.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QEMU 7.1.0 and later

Vendor Advisory: https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.html

Restart Required: Yes

Instructions:

1. Update QEMU to version 7.1.0 or later. 2. Restart all QEMU processes and affected virtual machines. 3. Verify the rocker device is not enabled in your configuration.

🔧 Temporary Workarounds

Disable rocker device

all

Remove or disable the rocker device from QEMU configuration

Check QEMU command line or config file for '-device rocker' and remove it
Verify with: ps aux | grep qemu | grep -v grep | grep rocker

🧯 If You Can't Patch

  • Ensure rocker device is not enabled in any QEMU configuration
  • Implement strict access controls to guest OS instances and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check QEMU version with 'qemu-system-x86_64 --version' and verify if version is 7.0.0 or earlier AND rocker device is enabled in configuration.

Check Version:

qemu-system-x86_64 --version | head -1

Verify Fix Applied:

Verify QEMU version is 7.1.0 or later with 'qemu-system-x86_64 --version' and confirm rocker device is not enabled.

📡 Detection & Monitoring

Log Indicators:

  • QEMU process crashes with segmentation faults
  • Guest OS attempting to access rocker device functionality
  • Unexpected guest program execution patterns

Network Indicators:

  • Unusual network traffic from guest to host emulation layer

SIEM Query:

process_name:"qemu-system" AND (event_type:"crash" OR exit_code:139)

🔗 References

📤 Share & Export