Race Condition Vulnerability in Xen Hypervisor
CVE-2025-58143

9.8CRITICAL

Key Information:

Vendor
CVE Published:
11 September 2025

What is CVE-2025-58143?

This vulnerability arises from a race condition in the mapping of the reference Timestamp Counter (TSC) page within the Xen Hypervisor. An attacker with access to a virtual machine can exploit this flaw to manipulate the guest physical to machine (p2m) page tables, potentially leading to the freeing of memory pages while they are still active in the guest context. This can compromise the integrity and stability of the virtualized environment, demonstrating the critical importance of addressing memory handling vulnerabilities in cloud and virtualization infrastructures.

Affected Version(s)

Xen consult Xen advisory XSA-472

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was discovered by Roger Pau Monné of XenServer.
.
CVE-2025-58143 : Race Condition Vulnerability in Xen Hypervisor