HomeCyber BalkansGoogle Offering $250,000 for Full VM Escape Zero-day Vulnerability

Google Offering $250,000 for Full VM Escape Zero-day Vulnerability

Published on

spot_img

Google has recently introduced a new vulnerability reward program called kvmCTF, explicitly focusing on the Kernel-based Virtual Machine (KVM) hypervisor. This program, announced back in October 2023, highlights Google’s dedication to improving the security of foundational technologies like Linux and KVM, which are crucial components in many of its products such as Android and Google Cloud.

The KVM hypervisor has a strong reputation with over 15 years of open-source development and is widely utilized across both consumer and enterprise environments. Google, known for its active contribution to the KVM project, has developed kvmCTF as a collaborative platform for identifying and addressing vulnerabilities to strengthen this essential security boundary.

Drawing similarities to the existing kernelCTF program, kvmCTF specifically zeroes in on zero-day vulnerabilities and previously undiscovered security flaws. Participants in kvmCTF are provided access to a designated lab environment where they can log in and apply their exploits to capture flags.

To maintain the program’s focus on uncovering new, unpatched vulnerabilities, kvmCTF does not reward exploits that leverage n-day vulnerabilities. Details about any zero-day vulnerabilities discovered will only be shared with Google once an upstream patch is rolled out, ensuring that Google and the broader open-source community receive the information simultaneously.

The kvmCTF program offers significant rewards based on the severity of identified vulnerabilities. Reward tiers include $250,000 for a Full VM escape, $100,000 for Arbitrary memory write, $50,000 for Arbitrary memory read, $50,000 for Relative memory write, $20,000 for Denial of service, and $10,000 for Relative memory read. The program also provides the option of using a host with Kernel Address Sanitizer (KASAN) enabled to assist in identifying memory errors leading to these vulnerabilities.

Participants engage in a controlled environment where a bare metal host runs a single guest VM. They can reserve time slots to access the guest VM and conduct guest-to-host attacks, aiming to exploit zero-day vulnerabilities within the KVM subsystem of the host kernel. Successful attackers will be awarded a flag as proof of their accomplishment, with the reward amount determined by the severity of the attack.

Individuals interested in participating in kvmCTF must review the program’s rules, which outline the process of reserving a time slot, connecting to the guest VM, obtaining flags, and reporting vulnerabilities. Google’s kvmCTF initiative marks a significant advancement in the collaborative effort to secure open-source technologies.

By offering substantial rewards for discovering zero-day vulnerabilities, Google hopes to engage the global security community in enhancing the security and reliability of the KVM hypervisor, ultimately benefiting users worldwide. This initiative underscores Google’s commitment to cybersecurity and underscores the importance of vulnerability research in safeguarding critical technologies.

Source link

Latest articles

10 Billion Leaked Passwords Raise Concerns About Credential Stuffing

Security researchers are currently assessing the aftermath of a significant leak of stolen passwords...

88% increase in smishing attacks leads to improved collaboration between stakeholders in the banking industry.

In a recent report by Banking Frontiers, it has been revealed that there has...

Report: OpenAI Concealed 2023 Breach from Federal Authorities and the Public

A recent report has revealed that a hacker gained unauthorized access to data on...

New Zealand Fitness Retailer Targeted by DragonForce Ransomware

The DragonForce ransomware group, known for using locker malware based on the leaked LockBit...

More like this

10 Billion Leaked Passwords Raise Concerns About Credential Stuffing

Security researchers are currently assessing the aftermath of a significant leak of stolen passwords...

88% increase in smishing attacks leads to improved collaboration between stakeholders in the banking industry.

In a recent report by Banking Frontiers, it has been revealed that there has...

Report: OpenAI Concealed 2023 Breach from Federal Authorities and the Public

A recent report has revealed that a hacker gained unauthorized access to data on...
en_USEnglish