CVE-2024-11149

7.9 HIGH

📋 TL;DR

This vulnerability in OpenBSD's vmm(4) hypervisor fails to properly restore GDTR limits on Intel VMX CPUs, potentially allowing a malicious virtual machine to escape isolation and execute arbitrary code on the host system. It affects OpenBSD systems running virtual machines with the vmm hypervisor on Intel CPUs. The impact is limited to environments using OpenBSD's virtualization capabilities.

💻 Affected Systems

Products:
  • OpenBSD
Versions: OpenBSD 7.4 before errata 014
Operating Systems: OpenBSD
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using vmm(4) hypervisor on Intel CPUs with VMX extensions. AMD CPUs and systems not using virtualization are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious virtual machine could escape hypervisor isolation, gain host system privileges, and compromise the entire physical server and other VMs.

🟠

Likely Case

VM escape leading to host system compromise, potentially allowing lateral movement to other systems in the environment.

🟢

If Mitigated

Limited to VM escape only if proper network segmentation and host hardening are in place.

🌐 Internet-Facing: LOW - Requires access to a vulnerable VM, typically not directly internet-facing.
🏢 Internal Only: HIGH - Critical for virtualization hosts running untrusted VMs in internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires control of a guest VM and detailed knowledge of Intel VMX architecture. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OpenBSD 7.4 errata 014

Vendor Advisory: https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/014_vmm.patch.sig

Restart Required: Yes

Instructions:

1. Download the patch from OpenBSD errata page. 2. Apply patch: patch -p0 < 014_vmm.patch. 3. Rebuild and install kernel. 4. Reboot system.

🔧 Temporary Workarounds

Disable vmm hypervisor

openbsd

Temporarily disable virtualization if not required

sysctl hw.vmm.vmx=0

Migrate VMs to unaffected hypervisor

all

Move critical VMs to alternative virtualization platforms

🧯 If You Can't Patch

  • Isolate vulnerable hosts from critical networks and systems
  • Implement strict VM trust boundaries and monitor for suspicious VM behavior

🔍 How to Verify

Check if Vulnerable:

Check OpenBSD version and errata status: sysctl kern.version

Check Version:

sysctl kern.version

Verify Fix Applied:

Verify kernel includes errata 014: grep 'vmm.*GDTR' /usr/src/sys/arch/amd64/amd64/vmm.c

📡 Detection & Monitoring

Log Indicators:

  • Unusual VM behavior, unexpected host system calls from VM context
  • Kernel panic or hypervisor crashes

Network Indicators:

  • VM attempting network connections outside expected patterns
  • Unexpected host network activity from VM IPs

SIEM Query:

source="openbsd" AND (event_type="kernel_panic" OR message="vmm")

🔗 References

📤 Share & Export