Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31420: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2024-31420cvecve-2024-31420
Published: Wed Apr 03 2024 (04/03/2024, 14:01:07 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference flaw was found in KubeVirt. This flaw allows an attacker who has access to a virtual machine guest on a node with DownwardMetrics enabled to cause a denial of service by issuing a high number of calls to vm-dump-metrics --virtio and then deleting the virtual machine.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:55:28 UTC

Technical Analysis

CVE-2024-31420 is a NULL pointer dereference vulnerability identified in KubeVirt version 4.15.0, a virtualization management platform for Kubernetes. The flaw arises when DownwardMetrics is enabled on a node, which is a feature that allows virtual machines to expose metrics about themselves to the host environment. An attacker who has access to a virtual machine guest on such a node can repeatedly invoke the vm-dump-metrics command with the --virtio option. This excessive invocation, followed by deletion of the virtual machine, triggers a NULL pointer dereference in the KubeVirt codebase. The NULL pointer dereference leads to a denial of service condition by crashing the affected component or causing it to become unresponsive. The vulnerability requires the attacker to have at least limited privileges (PR:L) within the guest VM but does not require user interaction (UI:N). The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability (A:H) without affecting confidentiality or integrity. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely if they have guest access. No known public exploits or active exploitation have been reported as of the publication date. The vulnerability is specific to KubeVirt 4.15.0 and related to the handling of DownwardMetrics and vm-dump-metrics operations.

Potential Impact

The primary impact of CVE-2024-31420 is denial of service, which can disrupt virtualization workloads managed by KubeVirt. Organizations relying on KubeVirt for Kubernetes virtualization may experience service outages or instability on affected nodes, potentially impacting critical applications running inside virtual machines. Since the vulnerability requires guest VM access, it could be exploited by malicious insiders or attackers who have compromised a VM. The disruption could lead to downtime, affecting business continuity and operational efficiency. Although confidentiality and integrity are not directly impacted, the availability loss could cascade into broader service interruptions in cloud-native environments. This is particularly concerning for enterprises and cloud providers using KubeVirt in production, as it may affect multi-tenant environments and service-level agreements. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2024-31420, organizations should first verify if they are running KubeVirt version 4.15.0 with DownwardMetrics enabled. If so, they should apply any available patches or updates from the KubeVirt project or their vendor as soon as they are released. In the absence of patches, consider disabling the DownwardMetrics feature temporarily to prevent exploitation. Restrict guest VM access to trusted users only and monitor for unusual vm-dump-metrics command usage patterns. Implement strict access controls and network segmentation to limit exposure of virtual machines to untrusted actors. Additionally, enhance logging and alerting around vm-dump-metrics invocations and VM deletions to detect potential exploitation attempts early. Regularly audit virtualization infrastructure configurations and update to newer KubeVirt versions that address this vulnerability. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-04-03T12:10:43.208Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f6d0840b920e2708759b2

Added to database: 11/20/2025, 7:33:28 PM

Last enriched: 2/28/2026, 10:55:28 AM

Last updated: 3/26/2026, 1:56:41 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses