Xen Security Vulnerabilities (CVEs)
Track 33 security vulnerabilities affecting Xen products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This Xen hypervisor vulnerability allows indirect branch predictor poisoning between guest tasks, breaking kernel-level isolation. It affects Xen-base...
Jan 28, 2026This CVE describes an out-of-bounds write vulnerability in Xen's shadow mode tracing code where guest-controlled data can be written beyond allocated ...
Jan 28, 2026This Xen hypervisor vulnerability allows a guest domain to retain access to 64-bit memory BARs (Base Address Registers) after PCI device detachment, c...
Oct 31, 2025This vulnerability involves boundary checking bugs in Xen's handling of Viridian hypercalls, allowing out-of-bounds reads and writes. Attackers could ...
Oct 31, 2025CVE-2025-58143 is a race condition vulnerability in Xen's viridian code that allows a malicious guest VM to cause Xen to free a memory page while it's...
Sep 11, 2025CVE-2025-58145 is a race condition vulnerability in Xen hypervisor's page table management where the P2M lock isn't properly held during page referenc...
Sep 11, 2025Multiple vulnerabilities in Xen's viridian code allow attackers to cause denial of service or potentially execute arbitrary code through NULL pointer ...
Sep 11, 2025This vulnerability is a deadlock condition in Xen's interrupt remapping code for legacy PCI(-X) devices. When exploited, it can cause system instabili...
Jul 17, 2025This CVE describes a deadlock vulnerability in the Xen hypervisor's VGA memory access acceleration code for HVM guests. When emulating certain instruc...
Dec 19, 2024This CVE describes a vulnerability in Xen hypervisor's memory mapping logic for PCI devices with Reserved Memory Regions (RMRR) or Unity Mapping range...
Sep 25, 2024This vulnerability in Xen's x86 APIC implementation allows a malicious guest VM to trigger a deadlock in the hypervisor by configuring error interrupt...
Sep 25, 2024A Xen hypervisor vulnerability where HVM guests can set register values outside expected ranges during hypercall continuations, triggering a hyperviso...
May 16, 2024This CVE-2024-31142 vulnerability involves a logical error in Xen's XSA-407 mitigation for Branch Type Confusion, causing the protection to not apply ...
May 16, 2024This Xen hypervisor vulnerability allows a malicious PV guest to crash the host system by exploiting a race condition in shadow paging memory manageme...
Jan 5, 2024CVE-2023-34325 is a stack buffer overflow vulnerability in Xen's libfsimage library, derived from old grub-legacy code. Attackers with access to guest...
Jan 5, 2024The AdSanity WordPress plugin up to version 1.8.1 contains a vulnerability that allows authenticated users with Contributor-level permissions or highe...
Jun 7, 2023This CVE describes a use-after-free vulnerability in Xen's shadow mode with log-dirty mode enabled. It allows a malicious guest VM to crash the hyperv...
Mar 21, 2023This CVE describes a race condition vulnerability in Xen's VT-d (Virtualization Technology for Directed I/O) domain ID cleanup mechanism. It allows at...
Apr 5, 2022This vulnerability affects systems with Intel VT-d or AMD-Vi IOMMU technology when certain PCI devices use reserved memory regions. It allows DMA or i...
Apr 5, 2022This vulnerability affects systems using Intel VT-d or AMD-Vi IOMMU technologies where PCI devices have Reserved Memory Regions (RMRR) or Unity Mappin...
Apr 5, 2022Multiple race condition vulnerabilities in Linux PV device frontends allow malicious Xen backends to maintain unauthorized access to guest memory page...
Mar 10, 2022This CVE (CVE-2022-23038) is part of a series of vulnerabilities affecting Linux PV device frontends in Xen virtualization. It allows malicious or com...
Mar 10, 2022Multiple race condition vulnerabilities in Linux PV device frontends allow malicious Xen backends to maintain unauthorized access to guest memory page...
Mar 10, 2022CVE-2022-23042 is a race condition vulnerability in Linux Xen PV netfront driver where a malicious backend can trigger a BUG_ON() assertion failure, c...
Mar 10, 2022This Xen hypervisor vulnerability on ARM systems allows guest virtual machines to retain access to memory pages after returning them to Xen, potential...
Jan 25, 2022This Xen hypervisor vulnerability allows guest virtual machines to retain access to memory pages after they've been deallocated and potentially reused...
Dec 7, 2021This vulnerability in Xen hypervisor allows x86 HVM and PVH guests to cause memory corruption through improper error handling in partially successful ...
Nov 24, 2021CVE-2021-28706 is an integer overflow vulnerability in Xen hypervisor memory management that allows virtual machine guests to exceed their allocated m...
Nov 24, 2021This vulnerability in Xen hypervisor allows x86 HVM and PVH guests to crash the host system through misaligned page operations in populate-on-demand m...
Nov 24, 2021This vulnerability in Xen's VT-d IOMMU implementation allows a guest virtual machine to write to leaf page table entries when sharing page tables with...
Nov 21, 2021This vulnerability allows PCI devices with Reserved Memory Region Reporting (RMRR) to be improperly deassigned when passed through to virtual machine ...
Oct 6, 2021CVE-2021-28701 is a race condition vulnerability in Xen's grant table v2 status page handling that allows guest VMs to retain access to freed memory p...
Sep 8, 2021This Xen hypervisor vulnerability allows guest virtual machines to retain access to freed memory pages after switching from grant table v2 to v1. A ra...
Aug 27, 2021Why Monitor Xen Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 33+ known vulnerabilities affecting Xen products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Xen packages in under 60 seconds. No agents required - completely agentless scanning that works across Xen deployments.
Free vulnerability database: Access detailed information about every Xen CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Xen CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions