Description
In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor extension) enabled, a VS-mode guest write to the supervisor interrupt-enable CSR (sie) may be handled incorrectly and can influence machine-level interrupt enable state (mie). This breaks privilege/virtualization isolation and can lead to denial of service or privilege-boundary violation in environments relying on NEMU for correct interrupt virtualization.
Published: 2026-04-20
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation and Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability in OpenXiangShan NEMU occurs when a guest running in VS-mode writes to the supervisor interrupt‑enable CSR (sie) while the hypervisor extension (RVH) is enabled. The write is handled incorrectly and can modify the machine‑level interrupt enable register (mie). This flaw breaks the isolation between privilege layers and can let a guest influence host‑level interrupt handling. The result can be a denial of service or a breach of the privilege boundary expected by virtualization environments. The weakness is an improper enforcement of privilege boundaries, corresponding to access‑control failures.

Affected Systems

Affected systems are installations of OpenXiangShan NEMU built before the commit 55295c4. Any emulator run with RVH (hypervisor extension) enabled and that has not applied the patch from pull request 938 is vulnerable. No specific vendor or product list is provided beyond the NEMU emulator.

Risk and Exploitability

The EPSS score for this issue is not available and it is not listed in the CISA KEV catalog, indicating no known public exploits. The vulnerability is most likely exploitable only inside the emulator, requiring local control of a guest operating system and the ability to issue writes to sie. Because the flaw allows a guest to change host interrupt state, the potential impact is significant in environments where NEMU is used for isolation or virtual‑machine hosting. Without a public exploit and given the limited attack surface, the overall risk is moderate to high for environments that rely on NEMU for trusted virtualization.

Generated by OpenCVE AI on April 21, 2026 at 00:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenXiangShan NEMU to a build that includes the patch from commit 55295c4 or later.
  • If an upgrade cannot be performed immediately, disable the hypervisor extension (RVH) or run the emulator without hypervisor mode to avoid the vulnerable code path.
  • After applying an update or disabling RVH, verify that writes to sie no longer affect mie by performing isolated accessibility tests before deploying to production.

Generated by OpenCVE AI on April 21, 2026 at 00:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation and Denial of Service in OpenXiangShan NEMU Hypervisor Mode via Incorrect CSR Handling
Weaknesses CWE-250
CWE-284

Mon, 20 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Description In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor extension) enabled, a VS-mode guest write to the supervisor interrupt-enable CSR (sie) may be handled incorrectly and can influence machine-level interrupt enable state (mie). This breaks privilege/virtualization isolation and can lead to denial of service or privilege-boundary violation in environments relying on NEMU for correct interrupt virtualization.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-20T20:39:23.730Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29646

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T21:16:19.503

Modified: 2026-04-20T21:16:19.503

Link: CVE-2026-29646

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:15:16Z

Weaknesses