CVE-2026-23554
Use after free of paging structures in EPT
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
4th
The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging structures however is not deferred until the flushing is done, and can result in freed pages transiently being present in cached state. Such stale entries can point to memory ranges not owned by the guest, thus allowing access to unintended memory regions.
| Vendor | xen |
| Product | xen |
| Published | Mar 23, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for xen xen
Be the first to know when new high vulnerabilities affecting xen xen are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
Affected Versions
Xen / Xen
All versions affected References
Credits
This issue was discovered by Roger Pau MonnΓ© of XenServer.