CVE-2026-23554Time-of-check Time-of-use (TOCTOU) Race Condition in XEN

Severity
7.8HIGHNVD
EPSS
0.0%
top 98.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 23

Description

The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging structures however is not deferred until the flushing is done, and can result in freed pages transiently being present in cached state. Such stale entries can point to memory ranges not owned by the guest, thus allowing access to unintended memory regions.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 1.1 | Impact: 6.0

Affected Packages10 packages

Alpinexen/xen< 4.18.5-r5+3
NVDxen/xen
debiandebian/xen

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23554: The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications2026-03-23
OSV
CVE-2026-23554: The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications2026-03-23
GHSA
GHSA-h6vw-38xq-3xwx: The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications2026-03-23

📋Vendor Advisories

140
Debian
CVE-2026-23554: xen - The Intel EPT paging code uses an optimization to defer flushing of any cached E...2026
Citrix
Citrix Security Bulletin CTX111827
Citrix
Citrix Security Bulletin CTX116310
Citrix
Citrix Security Bulletin CTX108354
Citrix
Citrix Security Bulletin CTX677093

🕵️Threat Intelligence

1
Wiz
CVE-2026-23554 Impact, Exploitability, and Mitigation Steps | Wiz