CVE-2026-23555
Xenstored DoS by unprivileged domain
CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
4th
Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will still be serviced, but xenstored will use up all cpu time it can get.
| Vendor | xen |
| Product | xen |
| Published | Mar 23, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for xen xen
Be the first to know when new high vulnerabilities affecting xen xen are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Xen / Xen
All versions affected References
Credits
This issue was discovered by Marek Marczykowski-Góreckiof
Invisible Things Lab.