CVE-2021-28701

7.8 HIGH

📋 TL;DR

CVE-2021-28701 is a race condition vulnerability in Xen's grant table v2 status page handling that allows guest VMs to retain access to freed memory pages. This affects Xen hypervisor systems running paravirtualized (PV) guests. The vulnerability could lead to information disclosure or privilege escalation within the hypervisor context.

💻 Affected Systems

Products:
  • Xen Hypervisor
Versions: All Xen versions from introduction of grant table v2 support up to fixed versions
Operating Systems: Linux distributions with Xen packages, Any OS running Xen hypervisor
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using grant tables v2 with PV guests. HVM guests are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Guest VM could read sensitive data from reallocated memory pages, potentially leading to hypervisor compromise or data leakage between VMs.

🟠

Likely Case

Information disclosure where guest VMs access stale data from freed pages, potentially exposing sensitive information from other VMs or the hypervisor.

🟢

If Mitigated

With proper isolation controls and updated hypervisor, risk is limited to denial of service at worst.

🌐 Internet-Facing: MEDIUM - Requires guest VM access, but cloud providers with Xen-based infrastructure could be affected.
🏢 Internal Only: HIGH - Virtualization infrastructure with Xen hypervisors running affected versions are vulnerable to guest VM attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires guest VM access and precise timing to trigger the race condition during grant table version switching.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Xen 4.14.0, 4.13.1, 4.12.4, and later versions

Vendor Advisory: http://xenbits.xen.org/xsa/advisory-384.html

Restart Required: Yes

Instructions:

1. Update Xen hypervisor to patched version. 2. Reboot hypervisor host. 3. Verify all VMs are using updated grant table handling.

🔧 Temporary Workarounds

Disable grant table v2

linux

Force all guests to use grant table v1 only

xl vm-create configfile.cfg 'gnttab_version=1'
Edit VM config to include: gnttab_version = 1

🧯 If You Can't Patch

  • Isolate affected Xen hosts from critical infrastructure
  • Monitor for unusual guest VM memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check Xen version with: xl info | grep xen_version

Check Version:

xl info | grep xen_version

Verify Fix Applied:

Verify Xen version is 4.14.0+, 4.13.1+, or 4.12.4+

📡 Detection & Monitoring

Log Indicators:

  • Xen hypervisor logs showing grant table version switching
  • Unexpected memory access patterns in Xen debug logs

Network Indicators:

  • Not network exploitable - hypervisor local vulnerability

SIEM Query:

Search for Xen hypervisor logs containing 'grant table' and 'version switch' events with error codes

🔗 References

📤 Share & Export