Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24708: CWE-669 Incorrect Resource Transfer Between Spheres in OpenStack Nova

0
High
VulnerabilityCVE-2026-24708cvecve-2026-24708cwe-669
Published: Wed Feb 18 2026 (02/18/2026, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: OpenStack
Product: Nova

Description

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:05:52 UTC

Technical Analysis

CVE-2026-24708 is a vulnerability classified under CWE-669 (Incorrect Resource Transfer Between Spheres) found in OpenStack Nova, a core component of the OpenStack cloud computing platform responsible for managing compute instances. The issue affects Nova versions before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. The vulnerability is triggered when a malicious user writes a crafted QCOW (QEMU Copy-On-Write) image header to a root or ephemeral disk and then initiates a resize operation on that disk. Specifically, on compute nodes configured to use the Flat image backend (typically when use_cow_images=False), Nova calls the qemu-img tool to resize the image without enforcing format restrictions. This lack of validation allows the malicious QCOW header to cause qemu-img to perform unsafe operations that can corrupt or destroy data on the host system's storage. The vulnerability requires low privileges (a user with limited access) but does not require user interaction, and it affects the integrity and availability of the host system by potentially destroying critical data. The scope is limited to compute nodes using the Flat image backend, which is less common than the default copy-on-write image backend. No public exploits have been reported yet, but the CVSS v3.1 score of 8.2 (high severity) reflects the serious risk posed by this vulnerability. The underlying weakness is an incorrect transfer of control and resource handling between Nova and qemu-img, leading to unsafe execution of image resizing commands.

Potential Impact

The impact of CVE-2026-24708 is significant for organizations running OpenStack Nova with the Flat image backend configuration. Successful exploitation can lead to destruction or corruption of data on the host system, affecting the integrity and availability of compute node storage. This can cause downtime for virtual machines, loss of critical data, and potential disruption of cloud services hosted on affected infrastructure. Since the vulnerability allows low-privileged users to cause host-level damage, it increases the risk of insider threats or compromised tenant accounts causing widespread damage. Organizations relying on OpenStack for private or public cloud infrastructure may face service outages, data loss, and costly recovery efforts. The vulnerability does not directly affect confidentiality but poses a high risk to operational continuity and data integrity. Given the widespread use of OpenStack in enterprise and service provider environments, the potential scope of impact is broad, especially in deployments that have not adopted the recommended copy-on-write image backend.

Mitigation Recommendations

To mitigate CVE-2026-24708, organizations should upgrade OpenStack Nova to versions 30.2.2, 31.2.1, 32.1.1 or later where the vulnerability is patched. If immediate upgrading is not feasible, administrators should avoid using the Flat image backend by setting use_cow_images=True to enable the safer copy-on-write image backend, which is not affected by this vulnerability. Additionally, restrict permissions to prevent untrusted or low-privileged users from writing arbitrary QCOW headers to root or ephemeral disks. Implement strict access controls and monitoring on compute nodes to detect suspicious image resize operations. Regularly audit and validate image files before resizing to ensure they conform to expected formats. Employ host-level file integrity monitoring to detect unauthorized modifications. Finally, maintain up-to-date backups of critical data and virtual machine images to enable recovery in case of data destruction.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb4b8fb9188dea8c0ded

Added to database: 2/19/2026, 12:00:11 PM

Last enriched: 2/28/2026, 2:05:52 PM

Last updated: 4/4/2026, 4:22:26 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses