Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11614: Out-of-bounds Read

0
High
VulnerabilityCVE-2024-11614cvecve-2024-11614
Published: Wed Dec 18 2024 (12/18/2024, 08:30:49 UTC)
Source: CVE Database V5

Description

An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:30:33 UTC

Technical Analysis

CVE-2024-11614 is an out-of-bounds read vulnerability discovered in the Vhost library of the Data Plane Development Kit (DPDK), specifically within the checksum offload feature. The vulnerability arises when a malicious or compromised guest virtual machine (VM) crafts Virtio descriptors with invalid checksum start (csum_start) offsets in packets sent to the hypervisor's vSwitch via the vhost-user interface. This malformed input causes the vhost-user side to perform out-of-bounds memory reads, leading to a crash of the vSwitch component. The vSwitch is a critical component in virtualized network environments, responsible for forwarding packets between VMs and physical networks. The flaw does not allow attackers to read or modify memory contents but results in a denial-of-service (DoS) condition by crashing the vSwitch, disrupting network connectivity for affected VMs. Exploitation requires the attacker to have control over a guest VM with a virtio driver, which is common in many virtualized environments. The vulnerability affects DPDK version 21.05 and was assigned a CVSS 3.0 score of 7.4, reflecting high severity due to the potential for widespread service disruption and the lack of required privileges or user interaction. No public exploits have been reported yet, but the vulnerability's nature makes it a significant risk in multi-tenant cloud or NFV (Network Functions Virtualization) deployments relying on DPDK's vhost-user interfaces.

Potential Impact

The primary impact of CVE-2024-11614 is denial of service caused by crashing the hypervisor's vSwitch component. This can lead to network outages or degraded performance for multiple virtual machines sharing the affected vSwitch, disrupting critical services and applications. In cloud environments or NFV infrastructures where DPDK is widely used for high-performance packet processing, this vulnerability could cause significant operational impact, including loss of connectivity, service interruptions, and potential cascading failures in dependent systems. Although the vulnerability does not directly compromise confidentiality or integrity, the resulting DoS can affect business continuity and availability of network services. Organizations relying on multi-tenant virtualization platforms or virtualized network functions are particularly at risk, as a compromised or malicious VM could intentionally trigger this flaw to disrupt other tenants or services. The ease of exploitation without authentication or user interaction increases the threat level in shared infrastructure environments.

Mitigation Recommendations

To mitigate CVE-2024-11614, organizations should apply patches or updates provided by DPDK maintainers or their vendors as soon as they become available, especially for version 21.05 users. In the absence of immediate patches, administrators should consider restricting or isolating untrusted guest VMs that use virtio drivers to limit their ability to send malformed packets to the vhost-user interface. Network segmentation and strict access controls on management and virtual network interfaces can reduce exposure. Monitoring vSwitch logs and network traffic for unusual checksum offload requests or crashes can help detect exploitation attempts. Additionally, upgrading to newer, supported DPDK versions with security fixes and disabling unused checksum offload features in vhost-user configurations can reduce the attack surface. Implementing robust VM isolation and limiting privileges of guest VMs will further mitigate risks. Regular security assessments of virtualized network components are recommended to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-11-22T04:21:45.124Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 690ebb293a8fd010ecf4f0e9

Added to database: 11/8/2025, 3:38:17 AM

Last enriched: 2/28/2026, 11:30:33 AM

Last updated: 3/26/2026, 12:08:27 AM

Views: 139

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses