Description
Any guest can cause xenstored to crash by issuing a XS_RESET_WATCHES
command within a transaction due to an assert() triggering.

In case xenstored was built with NDEBUG #defined nothing bad will
happen, as assert() is doing nothing in this case. Note that the
default is not to define NDEBUG for xenstored builds even in release
builds of Xen.
Published: 2026-05-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Xen daemon called xenstored can be terminated when any guest domain sends an XS_RESET_WATCHES command inside a transaction. The command triggers an assertion failure that aborts xenstored, removing the Xen interface that guests use to communicate with the hypervisor. Because xenstored is a privileged component, its termination means the host’s management functionality becomes unavailable, effectively disabling control of all guest domains, which is a classic denial‑of‑service fault. The weakness is a non‑trusted input that leads to an unchecked assertion in a privileged process, corresponding to CWE‑617.

Affected Systems

The vulnerability exists in any Xen hypervisor build where xenstored is compiled without defining the NDEBUG macro. Xen builds use the default configuration that does not define NDEBUG, so all standard releases compiled in that mode may be affected. No specific product or version numbers are listed, and the advisory does not mention a patch or erratum.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, and the EPSS score is not available, so the likelihood of real‑world exploitation cannot be quantified precisely. An attacker only needs the ability to run a guest domain that can issue xenstored commands, a condition that is typically satisfied in environments where guests are under the control of a user. The crash removes the Xen socket, causing any subsequent attempts to talk to the hypervisor to fail until xenstored is restarted, which in turn would require a machine reboot or a manual restart of the daemon. The vulnerability is not in the CISA KEV catalog, but its local nature does not reduce its impact on host availability.

Generated by OpenCVE AI on May 19, 2026 at 18:23 UTC.

Remediation

Vendor Workaround

There is no known mitigation available.


OpenCVE Recommended Actions

  • Obtain the latest Xen source or any community patch that removes or guards the failing assertion in xenstored.
  • Rebuild xenstored with the NDEBUG macro enabled so that the assert() statement is eliminated or becomes a no‑op during compilation.
  • Restart xenstored after a crash or when making configuration changes to ensure the daemon is running normally; monitor logs for assertion failures.

Generated by OpenCVE AI on May 19, 2026 at 18:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Tue, 19 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-364
CWE-399

Tue, 19 May 2026 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-364
CWE-399

Tue, 19 May 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-617
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Xen
Xen xen
Vendors & Products Xen
Xen xen

Tue, 19 May 2026 14:30:00 +0000


Tue, 19 May 2026 13:45:00 +0000

Type Values Removed Values Added
Description Any guest can cause xenstored to crash by issuing a XS_RESET_WATCHES command within a transaction due to an assert() triggering. In case xenstored was built with NDEBUG #defined nothing bad will happen, as assert() is doing nothing in this case. Note that the default is not to define NDEBUG for xenstored builds even in release builds of Xen.
Title Xenstored DoS via XS_RESET_WATCHES command
References

cve-icon MITRE

Status: PUBLISHED

Assigner: XEN

Published:

Updated: 2026-05-19T14:42:45.464Z

Reserved: 2026-01-14T13:07:36.961Z

Link: CVE-2026-23557

cve-icon Vulnrichment

Updated: 2026-05-19T13:06:41.611Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-19T14:16:38.817

Modified: 2026-05-19T18:56:35.513

Link: CVE-2026-23557

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T18:30:11Z

Weaknesses