Impact
A non‑privileged guest domain can issue a Xenstore command that references the illegal node path "/local/domain/". Xenstored verifies the path and, due to a clobbered error indicator, triggers a failing assert() statement. When built with NDEBUG, the assert is disabled and instead the process stalls, consuming all available CPU and ceasing to service additional requests. The result is a denial of service that affects the host and all other virtual machines, as xenstored is no longer responsive during the stall period.
Affected Systems
This vulnerability impacts the Xen hypervisor family, specifically the Xenstored component in all releases that include it. Administrators managing Xen‑based virtualized environments should be aware that any Xen installation prior to a patch that addresses the crash logic is vulnerable. Vendor and product names are Xen for the hypervisor.
Risk and Exploitability
With a CVSS score of 7.1 the flaw is high severity, yet the EPSS score is below 1 %, indicating a low likelihood of exploitation in the wild at the moment. The attack requires only an unprivileged guest within the same host and does not require external network access. The vulnerability is not listed in the CISA KEV catalog, suggesting no widely available exploits as of now. Once a patch is released, the risk drops sharply, but until then, a malicious or compromised guest can exhaust host resources by engaging xenstored.
OpenCVE Enrichment