Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45869: n/a in n/a

0
Medium
VulnerabilityCVE-2022-45869cvecve-2022-45869n-acwe-362
Published: Wed Nov 30 2022 (11/30/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.

AI-Powered Analysis

AILast updated: 06/24/2025, 07:56:56 UTC

Technical Analysis

CVE-2022-45869 is a race condition vulnerability identified in the x86 Kernel-based Virtual Machine (KVM) subsystem of the Linux kernel, specifically affecting versions up to 6.1-rc6. This vulnerability arises when nested virtualization is enabled alongside the Two-Dimensional Paging (TDP) Memory Management Unit (MMU). Nested virtualization allows a virtual machine (guest OS) to itself run virtual machines, which is a feature used in complex virtualization scenarios such as cloud environments and development/testing platforms. The race condition flaw can be triggered by a user within the guest OS, leading to a denial of service (DoS) condition on the host OS. The impact manifests as either a host OS crash or memory corruption on the host, which compromises the stability and reliability of the host system. The vulnerability is classified under CWE-362 (Race Condition), indicating a timing issue where concurrent operations on shared resources are improperly synchronized. Exploitation requires local privileges within the guest OS and does not require user interaction, but it does require nested virtualization and TDP MMU to be enabled, which limits the scope to specific virtualization configurations. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the limited attack vector (local) and the absence of confidentiality or integrity impact, but a significant availability impact. No known exploits have been reported in the wild, and no official patches or vendor-specific advisories are linked, though mitigation would typically involve kernel updates once available or disabling nested virtualization or TDP MMU features if feasible.

Potential Impact

For European organizations, particularly those utilizing Linux-based virtualization infrastructure with nested virtualization enabled—such as cloud service providers, data centers, and enterprises running complex virtualized environments—this vulnerability poses a risk of host system instability. A successful exploitation could lead to host crashes or memory corruption, resulting in downtime, potential data loss, and disruption of services. This is especially critical for organizations relying on high availability and uptime, such as financial institutions, telecommunications providers, and critical infrastructure operators. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can indirectly affect business operations and service delivery. Additionally, organizations using nested virtualization for development, testing, or multi-tenant cloud environments may face increased risk if this feature is enabled without proper safeguards. The absence of known exploits reduces immediate risk, but the potential for denial of service in multi-tenant or shared environments warrants proactive attention.

Mitigation Recommendations

1. Apply kernel updates promptly once patches addressing CVE-2022-45869 are released by Linux distribution maintainers or the upstream kernel project. 2. If patching is not immediately possible, consider disabling nested virtualization on affected hosts, especially in production environments where stability is critical. 3. Evaluate the necessity of enabling TDP MMU; if not required, disable this feature to reduce exposure. 4. Implement strict access controls and monitoring on guest OS users to limit the ability to trigger the race condition exploit. 5. Employ robust host-level monitoring and alerting to detect abnormal host crashes or memory corruption events that may indicate exploitation attempts. 6. For cloud providers and multi-tenant environments, isolate workloads and enforce tenant separation policies to minimize the blast radius of potential DoS attacks. 7. Conduct regular security audits of virtualization configurations to ensure that features like nested virtualization and TDP MMU are enabled only when necessary and properly secured.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-23T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf0b41

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 6/24/2025, 7:56:56 AM

Last updated: 2/8/2026, 4:45:53 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats