CVE-2025-54567

4.2 MEDIUM

📋 TL;DR

This vulnerability in QEMU's PCIe Single Root I/O Virtualization (SR-IOV) implementation allows attackers with guest VM access to potentially manipulate Virtual Function (VF) enable bits incorrectly. It affects QEMU virtualization environments where SR-IOV is configured, potentially leading to denial of service or privilege escalation within the virtualized environment.

💻 Affected Systems

Products:
  • QEMU
Versions: Through version 10.0.3
Operating Systems: Linux, Windows, macOS - any OS running vulnerable QEMU
Default Config Vulnerable: ✅ No
Notes: Only affects configurations using PCIe SR-IOV functionality. Standard QEMU installations without SR-IOV are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Guest VM could gain elevated privileges on the host system or cause host system instability/crash through improper VF manipulation.

🟠

Likely Case

Guest VM could cause denial of service to other VMs or disrupt SR-IOV functionality within the virtualization environment.

🟢

If Mitigated

With proper isolation and limited guest privileges, impact is contained to the affected VM's functionality.

🌐 Internet-Facing: LOW - QEMU is typically not directly internet-facing; exploitation requires guest VM access.
🏢 Internal Only: MEDIUM - Internal virtualization infrastructure could be affected if attackers gain guest VM access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires guest VM access and knowledge of SR-IOV configuration. Related to CVE-2024-26327 which had similar issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QEMU 10.0.4 or later

Vendor Advisory: https://lore.kernel.org/qemu-devel/20250713-wmask-v1-1-4c744cdb32c0@rsg.ci.i.u-tokyo.ac.jp/

Restart Required: Yes

Instructions:

1. Update QEMU to version 10.0.4 or later. 2. Stop all VMs using SR-IOV. 3. Install updated QEMU packages. 4. Restart QEMU services. 5. Verify version with 'qemu-system-x86_64 --version'.

🔧 Temporary Workarounds

Disable SR-IOV

all

Temporarily disable PCIe SR-IOV functionality in QEMU configuration

Edit QEMU configuration to remove or comment out SR-IOV related options
Remove '-device vfio-pci' or similar SR-IOV parameters from VM configurations

Restrict Guest Privileges

all

Limit guest VM access to PCI configuration space

Configure QEMU with reduced device passthrough permissions
Use '-device vfio-pci,x-no-mmap=on' to restrict memory mapping

🧯 If You Can't Patch

  • Isolate vulnerable VMs from critical infrastructure
  • Implement strict access controls to prevent unauthorized guest VM access

🔍 How to Verify

Check if Vulnerable:

Check QEMU version and SR-IOV configuration: 'qemu-system-x86_64 --version' and review VM configurations for SR-IOV devices

Check Version:

qemu-system-x86_64 --version | head -1

Verify Fix Applied:

Verify QEMU version is 10.0.4 or later: 'qemu-system-x86_64 --version' shows version >= 10.0.4

📡 Detection & Monitoring

Log Indicators:

  • QEMU logs showing PCI configuration space access errors
  • Kernel logs related to PCIe errors or VF malfunctions
  • Unexpected VM crashes or SR-IOV device disconnections

Network Indicators:

  • Unusual traffic patterns from VMs using SR-IOV devices
  • Network interruptions for VMs with SR-IOV NICs

SIEM Query:

source="qemu.log" AND ("pcie" OR "sriov" OR "vf") AND (error OR fail OR crash)

🔗 References

📤 Share & Export