{"api_version":"1","generated_at":"2026-05-13T05:23:19+00:00","cve":"CVE-2021-28693","urls":{"html":"https://cve.report/CVE-2021-28693","api":"https://cve.report/api/cve/CVE-2021-28693.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-28693","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-28693"},"summary":{"title":"CVE-2021-28693","description":"xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must \"scrub\" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.","state":"PUBLIC","assigner":"security@xen.org","published_at":"2021-06-30 11:15:00","updated_at":"2021-09-21 16:14:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://xenbits.xenproject.org/xsa/advisory-372.txt","name":"https://xenbits.xenproject.org/xsa/advisory-372.txt","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202107-30","name":"GLSA-202107-30","refsource":"GENTOO","tags":[],"title":"Xen: Multiple vulnerabilities (GLSA 202107-30) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-28693","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28693","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Array","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"28693","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"28693","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"4.15.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"28693","vulnerable":"1","versionEndIncluding":"4.15.0","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"xen","cpe5":"xen","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-28693","qid":"180484","title":"Debian Security Update for xen (CVE-2021-28693)"},{"cve":"CVE-2021-28693","qid":"281644","title":"Fedora Security Update for xen (FEDORA-2021-993693c914)"},{"cve":"CVE-2021-28693","qid":"281645","title":"Fedora Security Update for xen (FEDORA-2021-41d4347447)"},{"cve":"CVE-2021-28693","qid":"500800","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28693","qid":"501518","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28693","qid":"501796","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28693","qid":"504543","title":"Alpine Linux Security Update for xen"},{"cve":"CVE-2021-28693","qid":"710038","title":"Gentoo Linux Xen Multiple vulnerabilities (GLSA 202107-30)"},{"cve":"CVE-2021-28693","qid":"751074","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2925-1)"},{"cve":"CVE-2021-28693","qid":"751083","title":"SUSE Enterprise Linux Security Update for xen (SUSE-SU-2021:2924-1)"},{"cve":"CVE-2021-28693","qid":"751100","title":"OpenSUSE Security Update for xen (openSUSE-SU-2021:2923-1)"},{"cve":"CVE-2021-28693","qid":"751111","title":"OpenSUSE Security Update for xen (openSUSE-SU-2021:1236-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@xen.org","ID":"CVE-2021-28693","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"xen","version":{"version_data":[{"version_value":"4.15.x"}]}},{"product_name":"xen","version":{"version_data":[{"version_affected":"?<","version_value":"4.12"},{"version_affected":">=","version_value":"4.13.x"},{"version_affected":"!>","version_value":"4.14.x"}]}},{"product_name":"xen","version":{"version_data":[{"version_value":"xen-unstable"}]}},{"product_name":"xen","version":{"version_data":[{"version_value":"4.12.x"}]}}]},"vendor_name":"Xen"}]}},"configuration":{"configuration_data":{"description":{"description_data":[{"lang":"eng","value":"Only Arm systems are vulnerable.  System running with \"bootscrub=off\"\n(disabling boot scrubbing) are not vulnerable.\n\nAll versions of Xen since 4.12 are vulnerable."}]}}},"credit":{"credit_data":{"description":{"description_data":[{"lang":"eng","value":"This issue was discovered by Julien Grall of Amazon."}]}}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must \"scrub\" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm."}]},"impact":{"impact_data":{"description":{"description_data":[{"lang":"eng","value":"Sensitive information from the boot modules might be visible to another\ndomain after boot."}]}}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"unknown"}]}]},"references":{"reference_data":[{"url":"https://xenbits.xenproject.org/xsa/advisory-372.txt","refsource":"MISC","name":"https://xenbits.xenproject.org/xsa/advisory-372.txt"},{"refsource":"GENTOO","name":"GLSA-202107-30","url":"https://security.gentoo.org/glsa/202107-30"}]},"workaround":{"workaround_data":{"description":{"description_data":[{"lang":"eng","value":"There is no mitigation available."}]}}}},"nvd":{"publishedDate":"2021-06-30 11:15:00","lastModifiedDate":"2021-09-21 16:14:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","versionStartIncluding":"4.12.0","versionEndIncluding":"4.15.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:xen:xen:4.15.0:rc1:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"28693","Ordinal":"203869","Title":"CVE-2021-28693","CVE":"CVE-2021-28693","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"28693","Ordinal":"1","NoteData":"xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must \"scrub\" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"28693","Ordinal":"2","NoteData":"2021-06-30","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"28693","Ordinal":"3","NoteData":"2021-07-12","Type":"Other","Title":"Modified"}]}}}