Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-27466

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] There are multiple issues related to the handling and accessing of guest memory pages in the viridian code: 1. A NULL pointer dereference in the updating of the reference TSC area. This is CVE-2025-27466. 2. A NULL pointer dereference by assuming the SIM page is mapped when a synthetic timer message has to be delivered. This is CVE-2025-58142. 3. A race in the mapping of the reference TSC page, where a guest can get Xen to free a page while still present in the guest physical to machine (p2m) page tables. This is CVE-2025-58143.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.6%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2025-27466
  • Xen » Xen » Version: 4.13.0
    cpe:2.3:o:xen:xen:4.13.0
  • Xen » Xen » Version: 4.13.1
    cpe:2.3:o:xen:xen:4.13.1
  • Xen » Xen » Version: 4.13.2
    cpe:2.3:o:xen:xen:4.13.2
  • Xen » Xen » Version: 4.13.3
    cpe:2.3:o:xen:xen:4.13.3
  • Xen » Xen » Version: 4.13.4
    cpe:2.3:o:xen:xen:4.13.4
  • Xen » Xen » Version: 4.13.5
    cpe:2.3:o:xen:xen:4.13.5
  • Xen » Xen » Version: 4.14.0
    cpe:2.3:o:xen:xen:4.14.0
  • Xen » Xen » Version: 4.14.1
    cpe:2.3:o:xen:xen:4.14.1
  • Xen » Xen » Version: 4.14.2
    cpe:2.3:o:xen:xen:4.14.2
  • Xen » Xen » Version: 4.14.3
    cpe:2.3:o:xen:xen:4.14.3
  • Xen » Xen » Version: 4.14.4
    cpe:2.3:o:xen:xen:4.14.4
  • Xen » Xen » Version: 4.14.5
    cpe:2.3:o:xen:xen:4.14.5
  • Xen » Xen » Version: 4.14.6
    cpe:2.3:o:xen:xen:4.14.6
  • Xen » Xen » Version: 4.15.0
    cpe:2.3:o:xen:xen:4.15.0
  • Xen » Xen » Version: 4.15.1
    cpe:2.3:o:xen:xen:4.15.1
  • Xen » Xen » Version: 4.15.2
    cpe:2.3:o:xen:xen:4.15.2
  • Xen » Xen » Version: 4.15.3
    cpe:2.3:o:xen:xen:4.15.3
  • Xen » Xen » Version: 4.15.4
    cpe:2.3:o:xen:xen:4.15.4
  • Xen » Xen » Version: 4.15.5
    cpe:2.3:o:xen:xen:4.15.5
  • Xen » Xen » Version: 4.15.6
    cpe:2.3:o:xen:xen:4.15.6
  • Xen » Xen » Version: 4.15.7
    cpe:2.3:o:xen:xen:4.15.7
  • Xen » Xen » Version: 4.16
    cpe:2.3:o:xen:xen:4.16
  • Xen » Xen » Version: 4.16.0
    cpe:2.3:o:xen:xen:4.16.0
  • Xen » Xen » Version: 4.16.1
    cpe:2.3:o:xen:xen:4.16.1
  • Xen » Xen » Version: 4.16.2
    cpe:2.3:o:xen:xen:4.16.2
  • Xen » Xen » Version: 4.16.3
    cpe:2.3:o:xen:xen:4.16.3
  • Xen » Xen » Version: 4.16.4
    cpe:2.3:o:xen:xen:4.16.4
  • Xen » Xen » Version: 4.16.5
    cpe:2.3:o:xen:xen:4.16.5
  • Xen » Xen » Version: 4.16.6
    cpe:2.3:o:xen:xen:4.16.6
  • Xen » Xen » Version: 4.16.7
    cpe:2.3:o:xen:xen:4.16.7
  • Xen » Xen » Version: 4.17
    cpe:2.3:o:xen:xen:4.17


Contact Us

Shodan ® - All rights reserved