Vulnerability Description
An out-of-bounds write issue in the virtio PCI transport in Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute arbitrary code on the host via modification of virtio queue configuration registers after device activation. Achieving code execution on the host requires additional preconditions, such as the use of a custom guest kernel or specific snapshot configurations. To remediate this, users should upgrade to Firecracker 1.14.4 or 1.15.1 and later.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://aws.amazon.com/security/security-bulletins/2026-015-aws/
- https://github.com/firecracker-microvm/firecracker/releases/tag/v1.14.4
- https://github.com/firecracker-microvm/firecracker/releases/tag/v1.15.1
- https://github.com/firecracker-microvm/firecracker/security/advisories/GHSA-776c
FAQ
What is CVE-2026-5747?
CVE-2026-5747 is a vulnerability with a CVSS score of 7.5 (HIGH). An out-of-bounds write issue in the virtio PCI transport in Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecrac...
How severe is CVE-2026-5747?
CVE-2026-5747 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5747?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.