CVE-2026-5747
Published:April 07, 2026
Updated:April 20, 2026
An out-of-bounds write issue in the virtio PCI transport in Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute arbitrary code on the host via modification of virtio queue configuration registers after device activation. Achieving code execution on the host requires additional preconditions, such as the use of a custom guest kernel or specific snapshot configurations.
To remediate this, users should upgrade to Firecracker 1.14.4 or 1.15.1 and later.
Affected Packages
https://github.com/firecracker-microvm/firecracker.git (GITHUB):
Affected version(s) =v1.15.0 <v1.15.1Fix Suggestion:
Update to version v1.15.1https://github.com/firecracker-microvm/firecracker.git (GITHUB):
Affected version(s) >=v1.13.0 <v1.14.4Fix Suggestion:
Update to version v1.14.4Related ResourcesĀ (4)
Do you need more information?
Contact UsCVSS v4
Base Score:
8.7
Attack Vector
LOCAL
Attack Complexity
HIGH
Attack Requirements
PRESENT
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
7.5
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
EPSS
Base Score:
0.02