CVE-2025-58148
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-58148 is a security vulnerability discovered in Xen's handling of Viridian hypercalls. The vulnerability was publicly disclosed on October 21, 2025, as part of XSA-475. It affects Xen versions 4.15 and newer, specifically impacting x86 HVM guests with Viridian enabled (Xen Advisory).

Technical details

The vulnerability stems from boundary checking bugs in Viridian hypercalls that process vCPU ID mask inputs. Specifically, hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds and operate on a wild vCPU pointer. This occurs during the processing of vCPU ID mask inputs in any of the three available formats (Xen Advisory, Ubuntu CVE).

Impact

A malicious or buggy guest can exploit this vulnerability to cause Denial of Service (DoS) affecting the entire host, information leaks, or elevation of privilege. The vulnerability has been assigned a CVSS 3.1 Base Score of 7.5 (High), indicating significant potential impact (Xen Advisory).

Mitigation and workarounds

The primary mitigation is to not enable Viridian for guest VMs. For a permanent fix, system administrators should apply the security patches provided in XSA-475. These patches are available for Xen versions 4.17.x through 4.20.x. Citrix has also released updates for XenServer 8.4 through both Early Access and Normal update channels (Citrix Support, Xen Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40289N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40288N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40287N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40286N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025
CVE-2025-40285N/AN/A
  • Linux DebianLinux Debian
  • linux
NoYesDec 06, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management