CVE-2023-0664

7.8 HIGH

📋 TL;DR

This vulnerability allows a local unprivileged user on Windows systems running QEMU Guest Agent to manipulate the installer's repair custom actions, leading to privilege escalation. Attackers can gain SYSTEM-level privileges by exploiting this flaw. Only Windows installations of QEMU Guest Agent are affected.

💻 Affected Systems

Products:
  • QEMU Guest Agent for Windows
Versions: Versions prior to the fix in QEMU 7.2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of QEMU Guest Agent. Linux versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement.

🟠

Likely Case

Local user escalates to administrative privileges, allowing installation of malware, configuration changes, and access to sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts can be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal users with local access to Windows VMs running QEMU Guest Agent can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system and knowledge of the installer repair process manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QEMU 7.2.0 and later

Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2167423

Restart Required: Yes

Instructions:

1. Update QEMU Guest Agent to version 7.2.0 or later. 2. Apply patches from your distribution's repository. 3. Restart the QEMU Guest Agent service. 4. Verify the fix by checking the version.

🔧 Temporary Workarounds

Restrict Local Access

windows

Limit local user access to Windows systems running QEMU Guest Agent to trusted users only.

Disable Unnecessary Services

windows

Disable QEMU Guest Agent service if not required for functionality.

sc stop qemu-ga
sc config qemu-ga start= disabled

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Monitor for suspicious installer repair activities and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check QEMU Guest Agent version on Windows systems. Versions prior to 7.2.0 are vulnerable.

Check Version:

qemu-ga --version

Verify Fix Applied:

Verify QEMU Guest Agent version is 7.2.0 or later and check that the service is running properly.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing installer repair activities for QEMU Guest Agent
  • Unexpected privilege escalation events
  • Suspicious process creation with SYSTEM privileges

Network Indicators:

  • Unusual outbound connections from QEMU Guest Agent service

SIEM Query:

EventID=4688 AND ProcessName LIKE '%qemu-ga%' AND NewProcessName LIKE '%cmd%' OR EventID=4688 AND ProcessName LIKE '%msiexec%' AND CommandLine LIKE '%qemu%'

🔗 References

📤 Share & Export