CVE-2025-11234
📋 TL;DR
This CVE describes a use-after-free vulnerability in QEMU's WebSocket handling for VNC. A malicious client can cause denial of service by exploiting a race condition during WebSocket handshake before authentication. Systems running QEMU with VNC WebSocket enabled are affected.
💻 Affected Systems
- QEMU
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete QEMU process crash leading to VM downtime and potential data corruption
Likely Case
Denial of service affecting VNC connectivity to specific VMs
If Mitigated
No impact if WebSocket VNC is disabled or network access is restricted
🎯 Exploit Status
Requires timing exploitation of race condition during handshake
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific Red Hat advisories for patched versions
Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:23228
Restart Required: Yes
Instructions:
1. Update QEMU packages using your distribution's package manager. 2. Restart affected VMs or QEMU processes. 3. Verify version is updated.
🔧 Temporary Workarounds
Disable VNC WebSocket
linuxDisable WebSocket support for VNC to prevent exploitation
Modify QEMU configuration to remove '-vnc ...' with websocket options
Network segmentation
linuxRestrict access to VNC WebSocket port (typically 5900+)
iptables -A INPUT -p tcp --dport 5900:5910 -j DROP
firewall-cmd --permanent --remove-port=5900-5910/tcp
🧯 If You Can't Patch
- Disable VNC WebSocket functionality entirely
- Implement strict network ACLs to block all external access to VNC ports
🔍 How to Verify
Check if Vulnerable:
Check QEMU version and if VNC WebSocket is enabled in configuration
Check Version:
qemu-system-x86_64 --version
Verify Fix Applied:
Verify QEMU version is updated beyond vulnerable versions listed in Red Hat advisories
📡 Detection & Monitoring
Log Indicators:
- QEMU process crashes
- VNC connection failures during handshake
- WebSocket handshake errors
Network Indicators:
- Multiple connection attempts to VNC WebSocket port followed by service disruption
SIEM Query:
source="qemu.log" AND ("crash" OR "segfault" OR "use-after-free")
🔗 References
- https://access.redhat.com/errata/RHSA-2025:23228
- https://access.redhat.com/errata/RHSA-2026:0326
- https://access.redhat.com/errata/RHSA-2026:0332
- https://access.redhat.com/errata/RHSA-2026:0702
- https://access.redhat.com/errata/RHSA-2026:1831
- https://access.redhat.com/errata/RHSA-2026:3077
- https://access.redhat.com/errata/RHSA-2026:3165
- https://access.redhat.com/security/cve/CVE-2025-11234
- https://bugzilla.redhat.com/show_bug.cgi?id=2401209