Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14876: Allocation of Resources Without Limits or Throttling

0
Medium
VulnerabilityCVE-2025-14876cvecve-2025-14876
Published: Wed Feb 18 2026 (02/18/2026, 20:47:54 UTC)
Source: CVE Database V5

Description

A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:27:16 UTC

Technical Analysis

CVE-2025-14876 is a vulnerability identified in the virtio-crypto device implementation within QEMU version 7.1.0. The root cause is a missing length limit check in the AKCIPHER cryptographic path, which is responsible for asymmetric key cipher operations. A malicious guest operating system running inside a QEMU virtual machine can exploit this flaw by sending specially crafted requests that cause the virtio-crypto device to allocate memory without any upper bound or throttling. This uncontrolled memory allocation can exhaust host system resources, leading to the termination of the QEMU process managing the guest VM. The termination results in a denial of service condition affecting the availability of the virtual machine and potentially other hosted services on the same host. The vulnerability requires local privileges on the guest OS (AV:L - local attack vector) and low attack complexity (AC:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. Although no known exploits are reported in the wild, the flaw poses a risk to environments relying on QEMU 7.1.0 for virtualization, especially those using the virtio-crypto device for cryptographic operations. The absence of patch links suggests that remediation may require updates from QEMU maintainers or applying workarounds to limit resource allocation or disable the vulnerable device.

Potential Impact

For European organizations, the primary impact of CVE-2025-14876 is the potential for denial of service on hosts running QEMU 7.1.0 with the virtio-crypto device enabled. This can disrupt critical virtualized workloads, affecting business continuity and service availability. Cloud service providers, data centers, and enterprises relying heavily on virtualization for infrastructure efficiency are particularly vulnerable. The disruption could cascade if multiple VMs are affected or if the host manages critical services. Although confidentiality and integrity are not impacted, the availability loss can lead to operational downtime, financial losses, and reputational damage. Organizations with strict uptime requirements or those providing services to customers across Europe must consider this vulnerability a significant operational risk until mitigated.

Mitigation Recommendations

European organizations should first verify if QEMU version 7.1.0 with the virtio-crypto device is in use within their virtualized environments. Immediate mitigation steps include disabling the virtio-crypto device if it is not essential, thereby eliminating the attack surface. If disabling is not feasible, implement resource limits and monitoring on QEMU processes to detect abnormal memory usage patterns indicative of exploitation attempts. Applying any available patches or updates from QEMU maintainers as soon as they are released is critical. Additionally, restrict guest OS privileges to minimize the ability of malicious actors to exploit this vulnerability. Employ host-level intrusion detection systems to monitor for unusual QEMU process terminations or resource exhaustion events. Finally, consider network segmentation and isolation of critical virtual machines to limit the impact of potential DoS attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-18T10:40:12.917Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69962af36aea4a407ae847db

Added to database: 2/18/2026, 9:11:15 PM

Last enriched: 2/18/2026, 9:27:16 PM

Last updated: 2/21/2026, 12:19:43 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats