{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T07:29:53.831","vulnerabilities":[{"cve":{"id":"CVE-2024-32668","sourceIdentifier":"secteam@freebsd.org","published":"2024-09-05T05:15:13.433","lastModified":"2024-11-21T09:15:25.913","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller.\n\nA malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process."},{"lang":"es","value":"Una validación de los límites insuficiente en el código USB podría provocar una escritura fuera de los límites en el montón, con datos controlados por el autor de la llamada. Un software malicioso y privilegiado que se ejecute en una máquina virtual invitada puede aprovechar la vulnerabilidad para lograr la ejecución de código en el host en el proceso de espacio de usuario bhyve, que normalmente se ejecuta como raíz. Tenga en cuenta que bhyve se ejecuta en un entorno aislado de Capsicum, por lo que el código malicioso está limitado por las capacidades disponibles para el proceso bhyve."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":6.0},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":6.0}]},"weaknesses":[{"source":"secteam@freebsd.org","type":"Secondary","description":[{"lang":"en","value":"CWE-193"},{"lang":"en","value":"CWE-787"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.3","matchCriteriaId":"E82CE719-C11D-4C34-BDF9-5AA704884289"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*","matchCriteriaId":"17DAE911-21E1-4182-85A0-B9F0059DDA7F"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*","matchCriteriaId":"ABEA48EC-24EA-4106-9465-CE66B938635F"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*","matchCriteriaId":"8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*","matchCriteriaId":"BC8C769C-A23E-4F61-AC42-4DA64421B096"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.3:p4:*:*:*:*:*:*","matchCriteriaId":"45B0589E-2E7D-4516-A8A0-88F30038EAB0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.3:p5:*:*:*:*:*:*","matchCriteriaId":"C5CD8EF6-B119-488F-A278-8E9740E3E482"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:13.4:beta3:*:*:*:*:*:*","matchCriteriaId":"2F52349C-6051-4CB9-8659-763A22C31640"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*","matchCriteriaId":"FA25530A-133C-4D7C-8993-D5C42D79A0B5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*","matchCriteriaId":"DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*","matchCriteriaId":"69A72B5A-2189-4700-8E8B-1E5E7CA86C40"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*","matchCriteriaId":"5771F187-281B-4680-B562-EFC7441A8F88"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*","matchCriteriaId":"0A4437F5-9DDA-4769-974E-23BFA085E0DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*","matchCriteriaId":"A9C3A3D4-C9F4-41EB-B532-821AF83470B1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*","matchCriteriaId":"878A1F0A-087F-47D7-9CA5-A54BB8D6676A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*","matchCriteriaId":"CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*","matchCriteriaId":"50A5E650-31FB-45BE-8827-641B58A83E45"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p8:*:*:*:*:*:*","matchCriteriaId":"D59CFDD3-AEC3-43F1-A620-0B1F0BAD9048"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:p9:*:*:*:*:*:*","matchCriteriaId":"44B8A489-6314-460D-90DA-AFB54298C8E6"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*","matchCriteriaId":"038E5B85-7F60-4D71-8D3F-EDBF6E036CE0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*","matchCriteriaId":"BF309824-D379-4749-A1FA-BCB2987DD671"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*","matchCriteriaId":"79D770C6-7A57-4A49-8164-C55391F62301"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*","matchCriteriaId":"AA813990-8C8F-4EE8-9F2B-9F73C510A7B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.1:p2:*:*:*:*:*:*","matchCriteriaId":"D4DFA201-27D5-4C01-B90F-E24778943C3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:14.1:p3:*:*:*:*:*:*","matchCriteriaId":"01DD321B-E5E2-49F7-86A1-D40B13E257C7"}]}]}],"references":[{"url":"https://security.freebsd.org/advisories/FreeBSD-SA-24:12.bhyve.asc","source":"secteam@freebsd.org","tags":["Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240920-0007/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}