🔐 CVE Alert

CVE-2026-23555

HIGH 7.1

Xenstored DoS by unprivileged domain

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
4th

Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will still be serviced, but xenstored will use up all cpu time it can get.

Vendor xen
Product xen
Published Mar 23, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for xen xen

Be the first to know when new high vulnerabilities affecting xen xen are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Xen / Xen
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
xenbits.xenproject.org: https://xenbits.xenproject.org/xsa/advisory-481.html openwall.com: http://www.openwall.com/lists/oss-security/2026/03/17/7 xenbits.xen.org: http://xenbits.xen.org/xsa/advisory-481.html

Credits

This issue was discovered by Marek Marczykowski-Góreckiof Invisible Things Lab.