CVE-2026-23553 — Improper Initialization in XEN
Severity
2.9LOWNVD
EPSS
0.0%
top 92.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
1
Timeline
PublishedJan 28
Description
In the context switch logic Xen attempts to skip an IBPB in the case of
a vCPU returning to a CPU on which it was the previous vCPU to run.
While safe for Xen's isolation between vCPUs, this prevents the guest
kernel correctly isolating between tasks. Consider:
1) vCPU runs on CPU A, running task 1.
2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB.
3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB.
4) vCPU moves back to CPU A. Xen skips IBPB again.
Now, task 2 i…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 1.4 | Impact: 1.4
Patches
🔴Vulnerability Details
4OSV▶
CVE-2026-23553: In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run↗2026-01-28
GHSA▶
GHSA-pxqc-5jg3-xfqm: In the context switch logic Xen attempts to skip an IBPB in the case of
a vCPU returning to a CPU on which it was the previous vCPU to run↗2026-01-28
OSV▶
CVE-2026-23553: In the context switch logic Xen attempts to skip an IBPB in the case of
a vCPU returning to a CPU on which it was the previous vCPU to run↗2026-01-28
📋Vendor Advisories
1Debian▶
CVE-2026-23553: xen - In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU r...↗2026