The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-31364

CVE-2023-31364: IOMMU Guest VM DoS Vulnerability

CVE-2023-31364 is a denial of service flaw in IOMMU systems where malicious guest VMs can flood hosts with memory writes, causing fatal errors. This article covers the technical details, impact, and mitigation.

Published: February 27, 2026

CVE-2023-31364 Overview

Improper handling of direct memory writes in the input-output memory management unit (IOMMU) could allow a malicious guest virtual machine (VM) to flood a host with writes, potentially causing a fatal machine check error resulting in denial of service. This vulnerability affects AMD processor platforms where virtualization environments rely on the IOMMU for memory isolation and protection between guest VMs and the host system.

Critical Impact

A malicious guest VM can exploit improper direct memory write handling in the IOMMU to flood the host system with memory writes, potentially triggering a fatal machine check error (MCE) and causing complete denial of service for the host and all co-located virtual machines.

Affected Products

  • AMD Processors with IOMMU functionality
  • Virtualization platforms utilizing AMD IOMMU
  • Hypervisors managing AMD-based guest virtual machines

Discovery Timeline

  • 2026-02-26 - CVE CVE-2023-31364 published to NVD
  • 2026-02-26 - Last updated in NVD database

Technical Details for CVE-2023-31364

Vulnerability Analysis

This vulnerability stems from improper handling of direct memory writes within the AMD Input-Output Memory Management Unit (IOMMU). The IOMMU is a critical hardware component responsible for managing memory access between devices and the host system, particularly in virtualized environments where memory isolation between guest VMs and the host is essential for security and stability.

When a malicious guest VM generates an excessive volume of direct memory write operations, the IOMMU fails to properly throttle or handle these requests. This flood of write operations can overwhelm the memory subsystem and trigger a Machine Check Exception (MCE), which is a critical hardware error that typically results in an immediate system halt or kernel panic.

The vulnerability is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating that the underlying issue relates to insufficient bounds checking or resource management in the memory handling logic.

Root Cause

The root cause of this vulnerability lies in the IOMMU's inability to properly rate-limit or validate the volume and nature of direct memory write operations initiated by guest virtual machines. The IOMMU component lacks adequate safeguards to prevent a single guest from monopolizing memory write resources or generating patterns of memory access that can trigger fatal hardware errors.

In normal operation, the IOMMU translates device memory addresses and enforces access controls. However, when confronted with a sustained flood of write operations from a malicious guest, the hardware protection mechanisms are insufficient to prevent the cascade of events leading to a machine check error.

Attack Vector

The attack can be executed from a network-accessible context by an attacker with low privileges who has access to a guest virtual machine on the target host. The attack does not require user interaction and can be initiated programmatically from within the guest VM.

The attacker must have the ability to execute code within a guest VM on the target hypervisor. From this position, the attacker can craft a sequence of direct memory write operations designed to exploit the IOMMU handling flaw. The resulting MCE affects not only the host system but also all other guest VMs running on the same physical hardware, making this a significant threat in multi-tenant cloud environments.

The vulnerability mechanism involves the malicious guest VM initiating rapid, sustained direct memory write operations that bypass normal IOMMU throttling. These operations accumulate until they trigger a Machine Check Exception in the host processor, causing system-wide denial of service.

For detailed technical information, refer to the AMD Security Bulletin SB-7059.

Detection Methods for CVE-2023-31364

Indicators of Compromise

  • Unusual spikes in memory write operations from specific guest VMs
  • Machine Check Exception (MCE) errors logged in host system journals
  • Unexpected host system crashes or kernel panics in virtualized environments
  • Abnormal IOMMU-related error messages in hardware event logs

Detection Strategies

  • Monitor hypervisor logs for signs of excessive memory operations from individual guest VMs
  • Implement hardware monitoring solutions that track MCE events and memory subsystem anomalies
  • Deploy host-based intrusion detection to identify unusual patterns of memory access within guest VMs
  • Enable IOMMU event logging and set alerts for error conditions

Monitoring Recommendations

  • Configure centralized logging for all hypervisor hosts to capture MCE and IOMMU-related events
  • Establish baseline metrics for normal memory write patterns per guest VM
  • Implement automated alerting when memory write operations exceed established thresholds
  • Regularly review hardware error logs for early warning signs of exploitation attempts

How to Mitigate CVE-2023-31364

Immediate Actions Required

  • Review the AMD Security Bulletin SB-7059 for vendor-specific guidance
  • Apply any available BIOS/UEFI or microcode updates from AMD that address this vulnerability
  • Implement resource quotas and rate limiting for guest VM memory operations where supported by the hypervisor
  • Consider isolating high-risk or untrusted workloads on dedicated hardware

Patch Information

AMD has published Security Bulletin SB-7059 addressing this vulnerability. System administrators should consult this bulletin and apply the recommended firmware or microcode updates. Contact your system vendor for the latest BIOS updates that incorporate AMD's security fixes.

Patch availability and specific remediation steps can be found in the AMD Security Bulletin SB-7059.

Workarounds

  • Limit guest VM privileges and capabilities to reduce the potential attack surface
  • Implement strict tenant isolation in multi-tenant environments
  • Enable additional hypervisor-level monitoring and resource controls
  • Consider IOMMU configuration options that may provide additional protection against resource exhaustion
bash
# Configuration example - Enable IOMMU strict mode in GRUB (Linux)
# Edit /etc/default/grub and add to GRUB_CMDLINE_LINUX:
# amd_iommu=on iommu=strict

# After editing, update GRUB configuration:
sudo update-grub
sudo reboot

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechVmware

  • SeverityHIGH

  • CVSS Score8.3

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-119
  • Technical References
  • AMD Security Bulletin SB-7059
  • Related CVEs
  • CVE-2022-31698: VMware Cloud Foundation DoS Vulnerability

  • CVE-2020-3999: VMware Workstation DoS Vulnerability

  • CVE-2024-37086: VMware Cloud Foundation DoS Vulnerability

  • CVE-2025-41227: VMware ESXi DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English