Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6505: Out-of-bounds Read

0
Medium
VulnerabilityCVE-2024-6505cvecve-2024-6505
Published: Fri Jul 05 2024 (07/05/2024, 13:51:38 UTC)
Source: CVE

Description

A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:47:25 UTC

Technical Analysis

CVE-2024-6505 is a vulnerability identified in the virtio-net device implementation within QEMU version 5.1.0. The issue arises when the Receive Side Scaling (RSS) feature is enabled on the virtio-net network card. Specifically, the vulnerability is due to insufficient validation of the indirections_table data structure used by RSS. This table becomes controllable by a privileged user inside the guest virtual machine. By setting excessively large values in the indirections_table, an attacker can trigger an out-of-bounds read condition, which can escalate to a heap overflow access in the host's QEMU process. This flaw allows a privileged guest user to cause a denial-of-service (DoS) condition by crashing the QEMU process managing the virtual machine. The vulnerability does not allow for confidentiality or integrity breaches but impacts availability by destabilizing the host environment. Exploitation requires high privileges within the guest VM but no user interaction. The vulnerability has a CVSS 3.1 base score of 6.8, reflecting a medium severity level. No public exploits are known at this time, and no patches or vendor advisories were provided in the initial disclosure.

Potential Impact

The primary impact of CVE-2024-6505 is on the availability of the host system running QEMU. A privileged user inside a guest VM can exploit this vulnerability to crash the QEMU process, effectively causing a denial-of-service condition. This can disrupt services hosted on the virtualized environment, potentially affecting multiple VMs if the host is destabilized or requires rebooting. Although the vulnerability does not compromise confidentiality or integrity, the ability to crash the hypervisor process poses a significant risk to operational continuity, especially in environments relying heavily on virtualization for critical workloads. Organizations using QEMU 5.1.0 with virtio-net and RSS enabled are at risk, particularly those with multi-tenant or cloud environments where guest users may have elevated privileges. The lack of known exploits reduces immediate risk, but the ease of triggering the flaw by a privileged guest user means it could be leveraged in targeted attacks or by malicious insiders.

Mitigation Recommendations

To mitigate CVE-2024-6505, organizations should first verify if they are running QEMU version 5.1.0 with the virtio-net device and RSS feature enabled. If so, immediate steps include disabling the RSS feature on virtio-net devices until a vendor patch is available, as this will prevent the indirections_table from becoming controllable. Restricting guest user privileges to the minimum necessary can reduce the risk, as exploitation requires high privileges within the guest. Monitoring QEMU process stability and implementing automated restarts or failover mechanisms can help reduce downtime if crashes occur. Applying any available vendor patches or updates promptly once released is critical. Additionally, consider isolating high-risk or untrusted guests on separate hosts to limit potential impact. Network segmentation and strict access controls on management interfaces can further reduce attack surface. Finally, maintain vigilance for any emerging exploit code or advisories related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-07-04T09:08:42.796Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d46994d7c5ea9f4b40d5c

Added to database: 5/21/2025, 3:20:57 AM

Last enriched: 2/28/2026, 3:47:25 AM

Last updated: 3/23/2026, 10:35:21 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses