Xenstored DoS by unprivileged domain
Summary
| CVE | CVE-2026-23555 |
|---|---|
| State | PUBLISHED |
| Assigner | XEN |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-23 07:16:07 UTC |
| Updated | 2026-04-10 20:38:17 UTC |
| Description | Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will still be serviced, but xenstored will use up all cpu time it can get. |
Risk And Classification
Primary CVSS: v3.1 7.1 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
EPSS: 0.000150000 probability, percentile 0.032650000 (date 2026-04-15)
Problem Types: CWE-617 | CWE-617 CWE-617 Reachable Assertion
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
| 3.1 | ADP | DECLARED | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 7.1 | HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
ChangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.openwall.com/lists/oss-security/2026/03/17/7 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| xenbits.xenproject.org/xsa/advisory-481.html | [email protected] | xenbits.xenproject.org | Patch, Vendor Advisory |
| xenbits.xen.org/xsa/advisory-481.html | af854a3a-2127-422b-91ae-364da2661108 | xenbits.xen.org | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: This issue was discovered by Marek Marczykowski-Góreckiof Invisible Things Lab. (en)
Additional Advisory Data
Workarounds
CNA: There is no known mitigation available.
There are currently no legacy QID mappings associated with this CVE.