CVE-2026-23555Reachable Assertion in XEN

Severity
7.1HIGHNVD
EPSS
0.0%
top 96.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23

Description

Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error indicator in xenstored when verifying the node path. Note that the crash is forced via a failing assert() statement in xenstored. In case xenstored is being built with NDEBUG #defined, an unprivileged guest trying to access the node path "/local/domain/" will result in it no longer being serviced by xenstored, other guests (including dom0) will stil

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 2.5 | Impact: 4.0

Affected Packages3 packages

Alpinexen/xen< 4.18.5-r5+3
NVDxen/xen
debiandebian/xen

Patches

🔴Vulnerability Details

3
GHSA
GHSA-hv7f-mhvh-6mf6: Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error in2026-03-23
OSV
CVE-2026-23555: Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error in2026-03-23
OSV
CVE-2026-23555: Any guest issuing a Xenstore command accessing a node using the (illegal) node path "/local/domain/", will crash xenstored due to a clobbered error in2026-03-23

📋Vendor Advisories

1
Debian
CVE-2026-23555: xen - Any guest issuing a Xenstore command accessing a node using the (illegal) node p...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23555 Impact, Exploitability, and Mitigation Steps | Wiz