CVE-2020-10725
moderate-risk
Published 2020-05-20
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
Do I need to act?
-
0.61% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.7/10
High
NETWORK
/ LOW complexity
Affected Products (5)
Data Plane Development Kit
Affected Vendors
References (12)
Issue Tracking
https://bugs.dpdk.org/show_bug.cgi?id=270
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725
Issue Tracking
https://bugs.dpdk.org/show_bug.cgi?id=270
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725
41
/ 100
moderate-risk
Severity
27/34 · High
Exploitability
2/34 · Minimal
Exposure
12/34 · Low