July 3rd, 2024

Google now pays $250k for KVM zero-day vulnerabilities

Google launches kvmCTF, a $250,000 reward program for KVM hypervisor exploits. Researchers target zero-day vulnerabilities in KVM crucial for Android and Google Cloud platforms. Program hosted on Google's secure Bare Metal Solution.

Read original articleLink Icon
Google now pays $250k for KVM zero-day vulnerabilities

Google has introduced a new vulnerability reward program called kvmCTF, offering $250,000 bounties for full VM escape exploits in the Kernel-based Virtual Machine (KVM) hypervisor. KVM is crucial for Android and Google Cloud platforms and has over 17 years of development. The program aims to identify and fix vulnerabilities in this security layer, focusing on zero-day vulnerabilities. Researchers can earn rewards for various exploit levels, with the highest being full VM escape. The program provides a controlled lab environment for researchers to attempt attacks and capture flags. Google emphasizes high-security standards by hosting kvmCTF on its Bare Metal Solution (BMS) environment. Participants must follow program rules, reserve time slots, and report vulnerabilities following detailed instructions. Google will only receive details of zero-day vulnerabilities after patches are released to ensure simultaneous sharing with the open-source community.

Link Icon 3 comments
By @xyst - 4 months
I wonder if people “double dip” by first offloading vulnerabilities to black market. Then claim the bug bounty later on.

- find vuln (0day to you)

- sell sploit on black market (0day for black market

- months later, confirm if vulnerability has not been patched

- if not patched, submit bug report and claim as new 0-day. “0day” for company. But it’s really been in the wild for 180-days

- google sends $250K check but “researcher” also received $750K on the black market

In addition to double dipping, can these high bounties also act as a way for employees to pad their salaries?

- “accidentally” introduce bug in patch. Very easy to do an “xz/jia tan” like attack. Maybe slip it in a massive change request

- let buddy know this vulnerability exists. Then have them claim the bounty.

- months later have accomplice send cryto/nft/cash

Probably can’t do this too often though.

By @teruakohatu - 4 months
On one hand it sounds a lot, on the other hand ... probably less than a year's salary* for a SV software engineer with enough skill to find and fix a zero-day KVM.

* I am not an American, just a wild guess.