CVE-2020-14339: Vulnerability Analysis & Exploit Details

Status: Analyzed - Last modified: 07-11-2022 Published: 03-12-2020

CVE-2020-14339
Vulnerability Scoring

8.8
/10

Attack Complexity Details

  • Attack Complexity: Low Impact
  • Attack Vector: LOCAL
  • Privileges Required: Low Impact
  • Scope: CHANGED
  • User Interaction: NONE

CIA Impact Definition

  • Confidentiality: HIGH IMPACT
  • Integrity: HIGH IMPACT
  • Availability: HIGH IMPACT

CVE-2020-14339 Vulnerability Summary

A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Access Complexity Graph for CVE-2020-14339

Impact Analysis for CVE-2020-14339

CVE-2020-14339: Detailed Information and External References

EPSS

0.00044

EPSS %

0.15085

References

0.00044

CWE

CWE-772

CAPEC

0.00044

  • HTTP DoS: An attacker performs flooding at the HTTP level to bring down only a particular web application rather than anything listening on a TCP/IP connection. This denial of service attack requires substantially fewer packets to be sent which makes DoS harder to detect. This is an equivalent of SYN flood in HTTP. The idea is to keep the HTTP session alive indefinitely and then repeat that hundreds of times. This attack targets resource depletion weaknesses in web server software. The web server will wait to attacker's responses on the initiated HTTP sessions while the connection threads are being exhausted.

Vulnerable Configurations

  • cpe:2.3:a:redhat:libvirt:6.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.3.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.3.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.3.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.3.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.4.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.4.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.4.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.4.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.5.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.5.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.6.0:-:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.6.0:-:*:*:*:*:*:*
  • cpe:2.3:a:redhat:libvirt:6.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:libvirt:6.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*

CVSS3 Source

nvd@nist.gov

CVSS3 Type

Primary

CVSS3 Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Protect Your Infrastructure: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Recently Published CVEs