CVE-2020-27672

7.0 HIGH

📋 TL;DR

CVE-2020-27672 is a race condition vulnerability in Xen hypervisor that leads to use-after-free with superpages. This allows x86 guest OS users to cause host OS denial of service, data corruption, or potentially gain privileges. Affects Xen hypervisor installations with x86 guest virtual machines.

💻 Affected Systems

Products:
  • Xen Hypervisor
Versions: All versions through 4.14.x
Operating Systems: Linux (as host OS for Xen)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects x86 architecture with 2MiB or 1GiB superpages enabled. ARM architecture not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Guest OS users could gain elevated privileges on the host system, leading to complete compromise of the hypervisor and all guest VMs.

🟠

Likely Case

Host OS denial of service causing hypervisor crashes and VM downtime, potentially with data corruption in affected VMs.

🟢

If Mitigated

With proper isolation and monitoring, impact limited to denial of service affecting only the targeted VM and host.

🌐 Internet-Facing: MEDIUM - Requires guest OS access, but internet-facing VMs could be compromised through other vulnerabilities.
🏢 Internal Only: HIGH - Internal malicious users or compromised guest VMs can directly exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires guest OS user access and exploitation of race condition timing. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Xen 4.14.1 and later

Vendor Advisory: http://xenbits.xen.org/xsa/advisory-345.html

Restart Required: Yes

Instructions:

1. Update Xen to version 4.14.1 or later. 2. Apply vendor patches for Xen 4.13.x and earlier versions. 3. Reboot the hypervisor host to load patched kernel modules.

🔧 Temporary Workarounds

Disable superpages

linux

Disable 2MiB and 1GiB superpages to prevent the race condition

xl set-parameters domain-id superpages=0

🧯 If You Can't Patch

  • Implement strict access controls to limit guest OS user privileges
  • Isolate critical VMs on separate physical hosts from untrusted VMs

🔍 How to Verify

Check if Vulnerable:

Check Xen version: xl info | grep xen_version

Check Version:

xl info | grep xen_version

Verify Fix Applied:

Verify Xen version is 4.14.1 or later, or check for XSA-345 patch applied

📡 Detection & Monitoring

Log Indicators:

  • Hypervisor crashes or panics
  • Unexpected VM restarts
  • Kernel oops messages in host logs

Network Indicators:

  • Sudden loss of connectivity to multiple VMs
  • Unusual inter-VM communication patterns

SIEM Query:

source="xen.log" AND ("panic" OR "oops" OR "BUG:")

🔗 References

📤 Share & Export