CVE-2025-27465
BaseFortify
Publication date: 2025-07-16
Last updated on: 2025-11-04
Assigner: Xen Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| xen | xen | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-755 | The product does not handle or incorrectly handles an exceptional condition. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in Xen when certain instructions that need to be intercepted and emulated are replayed using an executable stub. Some of these instructions may raise exceptions that Xen is supposed to handle gracefully. However, for replayed instructions that use flags recovery logic, the metadata for exception handling was incorrect. This caused Xen to treat these exceptions as fatal instead of handling them properly.
How can this vulnerability impact me? :
The impact of this vulnerability is that Xen may treat certain exceptions as fatal instead of handling them gracefully. This could potentially lead to crashes or instability in systems running Xen, affecting availability and reliability.