CVE-2024-8354

5.5 MEDIUM

📋 TL;DR

A vulnerability in QEMU's USB endpoint handling allows unprivileged guest users to trigger an assertion failure, crashing the QEMU process on the host. This causes a denial of service affecting any host running vulnerable QEMU versions with USB device emulation enabled. Only systems using QEMU for virtualization are affected.

💻 Affected Systems

Products:
  • QEMU
Versions: Specific affected versions not specified in references; check vendor advisories for exact ranges
Operating Systems: Linux, Other OS running QEMU
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when USB device emulation is enabled for guest VMs. Default configurations may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service on the host system, disrupting all virtual machines running under that QEMU instance and potentially affecting host stability.

🟠

Likely Case

QEMU process crash terminating all guest VMs running under that instance, requiring host intervention to restart virtualization services.

🟢

If Mitigated

Minimal impact if proper isolation and monitoring are in place, with quick recovery through automated restart mechanisms.

🌐 Internet-Facing: LOW - QEMU is typically not directly internet-facing; exploitation requires guest VM access.
🏢 Internal Only: MEDIUM - Internal attackers with guest VM access can disrupt virtualization infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires guest VM access but appears straightforward based on the assertion failure mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor-specific updates (Red Hat, Ubuntu, etc.)

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-8354

Restart Required: Yes

Instructions:

1. Check your distribution's security advisories. 2. Update QEMU packages via package manager. 3. Restart affected QEMU instances and guest VMs.

🔧 Temporary Workarounds

Disable USB device emulation

linux

Remove USB device passthrough/emulation from guest VM configurations

Edit VM configuration files to remove USB device entries
Use virsh edit <vm> or similar to modify XML config

🧯 If You Can't Patch

  • Isolate guest VMs from each other to limit blast radius
  • Implement monitoring for QEMU process crashes with automated alerting

🔍 How to Verify

Check if Vulnerable:

Check QEMU version and if USB devices are configured for guest VMs

Check Version:

qemu-system-x86_64 --version

Verify Fix Applied:

Verify updated QEMU version and test USB functionality in guest VMs

📡 Detection & Monitoring

Log Indicators:

  • QEMU process crashes in system logs
  • Assertion failure messages mentioning usb_ep_get()

Network Indicators:

  • Sudden loss of connectivity to guest VMs

SIEM Query:

Process termination events for qemu-system-* with error codes

🔗 References

📤 Share & Export