CVE-2025-54567
📋 TL;DR
This vulnerability in QEMU's PCIe Single Root I/O Virtualization (SR-IOV) implementation allows attackers with guest VM access to potentially manipulate Virtual Function (VF) enable bits incorrectly. It affects QEMU virtualization environments where SR-IOV is configured, potentially leading to denial of service or privilege escalation within the virtualized environment.
💻 Affected Systems
- QEMU
📦 What is this software?
Qemu by Qemu
⚠️ Risk & Real-World Impact
Worst Case
Guest VM could gain elevated privileges on the host system or cause host system instability/crash through improper VF manipulation.
Likely Case
Guest VM could cause denial of service to other VMs or disrupt SR-IOV functionality within the virtualization environment.
If Mitigated
With proper isolation and limited guest privileges, impact is contained to the affected VM's functionality.
🎯 Exploit Status
Exploitation requires guest VM access and knowledge of SR-IOV configuration. Related to CVE-2024-26327 which had similar issues.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: QEMU 10.0.4 or later
Vendor Advisory: https://lore.kernel.org/qemu-devel/20250713-wmask-v1-1-4c744cdb32c0@rsg.ci.i.u-tokyo.ac.jp/
Restart Required: Yes
Instructions:
1. Update QEMU to version 10.0.4 or later. 2. Stop all VMs using SR-IOV. 3. Install updated QEMU packages. 4. Restart QEMU services. 5. Verify version with 'qemu-system-x86_64 --version'.
🔧 Temporary Workarounds
Disable SR-IOV
allTemporarily disable PCIe SR-IOV functionality in QEMU configuration
Edit QEMU configuration to remove or comment out SR-IOV related options
Remove '-device vfio-pci' or similar SR-IOV parameters from VM configurations
Restrict Guest Privileges
allLimit guest VM access to PCI configuration space
Configure QEMU with reduced device passthrough permissions
Use '-device vfio-pci,x-no-mmap=on' to restrict memory mapping
🧯 If You Can't Patch
- Isolate vulnerable VMs from critical infrastructure
- Implement strict access controls to prevent unauthorized guest VM access
🔍 How to Verify
Check if Vulnerable:
Check QEMU version and SR-IOV configuration: 'qemu-system-x86_64 --version' and review VM configurations for SR-IOV devices
Check Version:
qemu-system-x86_64 --version | head -1
Verify Fix Applied:
Verify QEMU version is 10.0.4 or later: 'qemu-system-x86_64 --version' shows version >= 10.0.4
📡 Detection & Monitoring
Log Indicators:
- QEMU logs showing PCI configuration space access errors
- Kernel logs related to PCIe errors or VF malfunctions
- Unexpected VM crashes or SR-IOV device disconnections
Network Indicators:
- Unusual traffic patterns from VMs using SR-IOV devices
- Network interruptions for VMs with SR-IOV NICs
SIEM Query:
source="qemu.log" AND ("pcie" OR "sriov" OR "vf") AND (error OR fail OR crash)