Skip to main content

VSA-2025-002: Xen and XAPI Vulnerabilities

PublishedUpdatedSeverityCVSS 4.0Affected products
2025-09-112025-09-11⚫ CriticalNot available yet- XCP-ng 8.2 and 8.3
info

Several XSAs and their associated CVEs were published. For Vates products, we classify the impact as Critical, as our LTS products are directly impacted. For details on how we assign severity levels, see our Severity Levels Explained page.

Summary

The Xen project recently disclosed multiple vulnerabilities affecting various versions of the Xen hypervisor and XAPI. These vulnerabilities could potentially allow for privilege escalation, denial of service, or information disclosure.

Impact

Xen

All hosts running VM using viridian_reference_tsc or viridian_stimer platform features enabled are vulnerable. These settings are enabled by default on VMs based on Windows templates.

XAPI

All XCP-ng hosts are managed through XAPI and are therefore vulnerable. Incompatibilities in UTF-8 handling can lead to a denial of service of the host from an authenticated XAPI user or from privileged code inside a guest.

Affected Versions

  • XCP-ng 8.2 LTS: Affected by the Xen vulnerabilities, deemed unlikely to be exploitable for the XAPI vulnerabilities.
  • XCP-ng 8.3 LTS: Affected.

Mitigation

Xen

VMs can be configured to disable the impacting platform features. This can be achieved with these commands:

xe vm-param-set uuid=<vm uuid> platform:viridian_reference_tsc=false
xe vm-param-set uuid=<vm uuid> platform:viridian_stimer=false

XAPI

There are no mitigations.

Resolution

As of 2025-09-11, the packages for these components have been updated in the official XCP-ng repositories. Users are strongly encouraged to update their systems as soon as possible.

List of packages fixing these issues:

  • XCP-ng 8.2:
    • xen-4.13.5-9.49.4.xcpng8.2
  • XCP-ng 8.3:
    • xen-4.17.5-15.3.xcpng8.3
    • xapi-25.6.0-1.12.xcpng8.3

Credits

Thanks to Xen Project and the XAPI team for their work on these vulnerabilities and the patches to fix them.

References