CVE-2022-23034
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-23034 is a vulnerability in the Xen hypervisor that was discovered by Julien Grall of Amazon. The vulnerability affects Xen versions from 3.2 onwards that have XSA-380 fixes applied. The issue stems from a reference counting mechanism introduced for grant mappings in PV guests with IOMMU enabled (Xen Advisory).

Technical details

The vulnerability occurs when PV guests request two forms of mappings. When both mapping types are in use for an individual mapping, unmapping can be requested in two steps. This causes the reference count to be mistakenly decremented twice, leading to counter underflow and triggering a hypervisor bug check. The vulnerability has a CVSS v3.1 Base Score of 5.5 (MEDIUM) with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability allows malicious guest kernels to mount a Denial of Service (DoS) attack affecting the entire system. The vulnerability specifically impacts x86 systems, while Arm systems are not affected. Only x86 PV guests with access to PCI devices can leverage the vulnerability, while x86 HVM and PVH guests, as well as PV guests without PCI device access, cannot exploit it (Xen Advisory).

Mitigation and workarounds

Several mitigation strategies are available: 1) Not running PV guests will avoid the vulnerability entirely. 2) For Xen 4.12 and older, not passing through PCI devices to PV guests prevents exploitation. 3) For Xen 4.13 and newer, disabling PCI device pass-through for PV guests by either omitting 'passthrough=...' and 'pci=...' settings or setting 'passthrough=disabled' in xl guest configuration files. 4) From Xen 4.13 onwards, using XSM SILO security policy can mitigate the vulnerability as it only permits guests to communicate with Dom0 (Xen Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48606HIGH7.8
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48639HIGH7.3
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48625HIGH7
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48608MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48569MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management