CVE-2026-24708

8.2 HIGH

📋 TL;DR

This vulnerability in OpenStack Nova allows authenticated users to trigger unsafe image resize operations by writing malicious QCOW headers to root or ephemeral disks. This could lead to data destruction on the host system. Only compute nodes using the Flat image backend (typically configured with use_cow_images=False) are affected.

💻 Affected Systems

Products:
  • OpenStack Nova
Versions: Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1
Operating Systems: All operating systems running affected Nova versions
Default Config Vulnerable: ✅ No
Notes: Only affects compute nodes using the Flat image backend (usually configured with use_cow_images=False)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete data destruction on the host system, potentially affecting multiple virtual machines and causing service disruption.

🟠

Likely Case

Targeted data corruption or destruction on specific compute nodes, leading to VM downtime and data loss.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place, potentially only affecting isolated resources.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user access and specific configuration (Flat image backend)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Nova 30.2.2, 31.2.1, or 32.1.1

Vendor Advisory: https://bugs.launchpad.net/nova/+bug/2137507

Restart Required: Yes

Instructions:

1. Upgrade Nova to version 30.2.2, 31.2.1, or 32.1.1 depending on your current version. 2. Restart Nova services. 3. Verify the fix is applied.

🔧 Temporary Workarounds

Disable Flat image backend

linux

Switch from Flat image backend to another backend if possible

# Modify nova.conf to use different image backend
# Set use_cow_images=True if switching from Flat backend

Restrict user permissions

all

Limit which users can trigger image resize operations

# Review and tighten Nova user roles and permissions
# Implement least privilege access controls

🧯 If You Can't Patch

  • Implement strict access controls to limit who can trigger image resize operations
  • Monitor for suspicious image resize activities and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check Nova version and verify if using Flat image backend with use_cow_images=False

Check Version:

nova-manage version

Verify Fix Applied:

Verify Nova version is 30.2.2, 31.2.1, or 32.1.1 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual qemu-img resize operations
  • Multiple image resize attempts from single user
  • Failed resize operations with QCOW headers

Network Indicators:

  • Increased API calls to image resize endpoints

SIEM Query:

source="nova" AND ("resize" OR "qemu-img") AND status="error"

🔗 References

📤 Share & Export