Arbitrary Code Execution as Root in FreeBSD bhyve through grub2-bhyve

Arbitrary Code Execution as Root in FreeBSD bhyve through grub2-bhyve

CVE-2020-10565 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.

Learn more about our Web Application Penetration Testing UK.