Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-58148

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-58148
  • Xen » Xen » Version: 14.4
    cpe:2.3:o:xen:xen:14.4
  • Xen » Xen » Version: 4.15.0
    cpe:2.3:o:xen:xen:4.15.0
  • Xen » Xen » Version: 4.15.1
    cpe:2.3:o:xen:xen:4.15.1
  • Xen » Xen » Version: 4.15.2
    cpe:2.3:o:xen:xen:4.15.2
  • Xen » Xen » Version: 4.15.3
    cpe:2.3:o:xen:xen:4.15.3
  • Xen » Xen » Version: 4.15.4
    cpe:2.3:o:xen:xen:4.15.4
  • Xen » Xen » Version: 4.15.5
    cpe:2.3:o:xen:xen:4.15.5
  • Xen » Xen » Version: 4.15.6
    cpe:2.3:o:xen:xen:4.15.6
  • Xen » Xen » Version: 4.15.7
    cpe:2.3:o:xen:xen:4.15.7
  • Xen » Xen » Version: 4.16
    cpe:2.3:o:xen:xen:4.16
  • Xen » Xen » Version: 4.16.0
    cpe:2.3:o:xen:xen:4.16.0
  • Xen » Xen » Version: 4.16.1
    cpe:2.3:o:xen:xen:4.16.1
  • Xen » Xen » Version: 4.16.2
    cpe:2.3:o:xen:xen:4.16.2
  • Xen » Xen » Version: 4.16.3
    cpe:2.3:o:xen:xen:4.16.3
  • Xen » Xen » Version: 4.16.4
    cpe:2.3:o:xen:xen:4.16.4
  • Xen » Xen » Version: 4.16.5
    cpe:2.3:o:xen:xen:4.16.5
  • Xen » Xen » Version: 4.16.6
    cpe:2.3:o:xen:xen:4.16.6
  • Xen » Xen » Version: 4.16.7
    cpe:2.3:o:xen:xen:4.16.7
  • Xen » Xen » Version: 4.17
    cpe:2.3:o:xen:xen:4.17
  • Xen » Xen » Version: 4.17.0
    cpe:2.3:o:xen:xen:4.17.0
  • Xen » Xen » Version: 4.17.1
    cpe:2.3:o:xen:xen:4.17.1
  • Xen » Xen » Version: 4.17.2
    cpe:2.3:o:xen:xen:4.17.2
  • Xen » Xen » Version: 4.17.3
    cpe:2.3:o:xen:xen:4.17.3
  • Xen » Xen » Version: 4.17.4
    cpe:2.3:o:xen:xen:4.17.4
  • Xen » Xen » Version: 4.17.5
    cpe:2.3:o:xen:xen:4.17.5
  • Xen » Xen » Version: 4.18.0
    cpe:2.3:o:xen:xen:4.18.0
  • Xen » Xen » Version: 4.18.1
    cpe:2.3:o:xen:xen:4.18.1
  • Xen » Xen » Version: 4.18.2
    cpe:2.3:o:xen:xen:4.18.2
  • Xen » Xen » Version: 4.18.3
    cpe:2.3:o:xen:xen:4.18.3
  • Xen » Xen » Version: 4.18.4
    cpe:2.3:o:xen:xen:4.18.4
  • Xen » Xen » Version: 4.19.0
    cpe:2.3:o:xen:xen:4.19.0
  • Xen » Xen » Version: 4.19.1
    cpe:2.3:o:xen:xen:4.19.1
  • Xen » Xen » Version: 4.19.2
    cpe:2.3:o:xen:xen:4.19.2
  • Xen » Xen » Version: 4.20.0
    cpe:2.3:o:xen:xen:4.20.0


Contact Us

Shodan ® - All rights reserved