Google has unveiled kvmCTF, a new vulnerability reward program (VRP) explicitly targeting the Kernel-based Virtual Machine (KVM) hypervisor.
This initiative, first announced in October 2023, underscores Google’s commitment to enhancing the security of foundational technologies like Linux and KVM, which are integral to many of its products, including Android and Google Cloud.
KVM, a robust hypervisor with over 15 years of open-source development, is widely used across consumer and enterprise landscapes.
Google, an active contributor to the KVM project, has designed kvmCTF as a collaborative platform for identifying and remediating vulnerabilities, thereby hardening this critical security boundary.
The program is similar to kernelCTF but focuses on zero-day vulnerabilities and previously unknown security flaws.
"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo
Participants in kvmCTF will have access to a lab environment to log in and utilize their exploits to obtain flags.
The program will not reward exploits that use n-day vulnerabilities, ensuring the focus remains on discovering new, unpatched vulnerabilities.
Details regarding any discovered zero-day vulnerabilities will be shared with Google only after an upstream patch is released, ensuring that Google receives the information simultaneously with the rest of the open-source community.
The kvmCTF program offers substantial rewards for various levels of the following vulnerabilities:
To facilitate the discovery of these vulnerabilities, kvmCTF provides the option of using a host with Kernel Address Sanitizer (KASAN) enabled, which helps identify memory errors.
Participants will engage in a controlled environment with a bare metal host running a single guest VM.
They can reserve time slots to access the guest VM and attempt guest-to-host attacks, aiming to exploit zero-day vulnerabilities in the KVM subsystem of the host kernel.
Successful attackers will obtain a flag as proof of their accomplishment, and the severity of the attack will determine the reward amount.
To participate in kvmCTF, interested individuals must read the program’s rules, which provide detailed information on reserving a time slot, connecting to the guest VM, and obtaining flags.
The rules also explain the mapping of various KASAN violations with the reward tiers and offer instructions on reporting a vulnerability.
Google’s kvmCTF initiative represents a significant step forward in the collaborative effort to secure open-source technologies.
By offering substantial rewards for discovering zero-day vulnerabilities, Google aims to engage the global security community in its mission to enhance the security and reliability of the KVM hypervisor, ultimately benefiting users worldwide.
Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files
Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…