Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26328: n/a

0
Medium
VulnerabilityCVE-2024-26328cvecve-2024-26328
Published: Mon Feb 19 2024 (02/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c does not set NumVFs to PCI_SRIOV_TOTAL_VF, and thus interaction with hw/nvme/ctrl.c is mishandled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:01:14 UTC

Technical Analysis

CVE-2024-26328 is a vulnerability identified in QEMU versions 7.1.0 through 8.2.1 related to the handling of PCI SR-IOV (Single Root I/O Virtualization) virtual functions within the virtualization platform. The root cause lies in the register_vfs function located in the hw/pci/pcie_sriov.c source file, which fails to properly set the NumVFs variable to the expected constant PCI_SRIOV_TOTAL_VF. This incorrect setting leads to improper interaction with the NVMe controller code in hw/nvme/ctrl.c. SR-IOV allows a single physical PCI device to appear as multiple separate virtual devices, improving performance and resource allocation in virtualized environments. The mishandling of NumVFs can cause the NVMe controller to behave unexpectedly, potentially leading to denial of service conditions such as crashes or unresponsiveness of virtualized NVMe devices. The vulnerability requires local attacker privileges with high-level access (PR:H) and does not require user interaction (UI:N). The scope is considered changed (S:C) because the impact affects components beyond the initial vulnerable code, specifically the NVMe controller handling. The CVSS v3.1 base score is 6.0, reflecting a medium severity level, with an attack vector limited to local access and a low attack complexity. Confidentiality and integrity are not impacted, but availability can be significantly affected. No public exploits or patches are currently documented, indicating that the vulnerability is newly disclosed and may not yet be widely exploited. This issue is particularly relevant for organizations running QEMU-based virtualization with PCI SR-IOV enabled NVMe devices, as they may experience service disruptions or instability if exploited.

Potential Impact

The primary impact of CVE-2024-26328 is on the availability of virtualized NVMe storage devices managed by QEMU in environments utilizing PCI SR-IOV. Exploitation could lead to denial of service conditions, causing virtual machines to lose access to critical storage resources, resulting in application downtime or system instability. Since confidentiality and integrity are not affected, data leakage or unauthorized data modification is unlikely. However, the disruption of storage availability can severely impact business operations, especially in cloud service providers, data centers, and enterprises relying on virtualized infrastructure for critical workloads. The requirement for local high-privilege access limits the attack surface to insiders or compromised administrative accounts, reducing the likelihood of remote exploitation but increasing risk from malicious insiders or attackers who have already gained elevated privileges. The scope change indicates that the vulnerability affects multiple components, potentially complicating detection and remediation. Organizations with heavy reliance on QEMU virtualization and SR-IOV-enabled NVMe devices may face operational risks, including service outages and degraded performance, until the vulnerability is addressed.

Mitigation Recommendations

To mitigate CVE-2024-26328, organizations should take the following specific actions: 1) Monitor QEMU vendor advisories and security bulletins closely for patches addressing this vulnerability and apply them promptly once available. 2) Review and audit virtualization configurations to identify use of PCI SR-IOV with NVMe devices and assess exposure. 3) Limit high-privilege local access to trusted administrators only, employing strict access controls and monitoring to reduce the risk of insider threats. 4) Implement runtime monitoring of QEMU processes and virtual machine storage performance to detect anomalies indicative of denial of service conditions. 5) Consider temporarily disabling PCI SR-IOV features for NVMe devices in QEMU environments where feasible until patches are applied. 6) Employ network segmentation and isolation for management interfaces to prevent unauthorized local access. 7) Conduct regular security training for administrators on the risks of privilege misuse and the importance of patching virtualization infrastructure. These targeted measures go beyond generic advice by focusing on the specific components and access vectors involved in this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d75b7ef31ef0b57250c

Added to database: 2/25/2026, 9:45:25 PM

Last enriched: 2/28/2026, 10:01:14 AM

Last updated: 4/12/2026, 3:36:57 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses