Latest Citrix XenServer vulnerabilities (Updated April 29, 2026) #

The Xen Project (upstream) and Citrix (downstream) released separate but related advisories to address these claims. The Xen Project issued technical advisories XSA-483 through XSA-489 to address the core source code. Notably, XSA-489 serves as a direct rebuttal to the April 24 audit, concluding that only five of the 89 claims were actionable. The remainder were identified as intended RBAC functionality or, in several instances, appeared to be "AI hallucinations" within the researcher's report. Simultaneously, Citrix released Security Bulletin CTX696527 to provide specific updates and hotfixes for commercial users, focusing on the practical impact to the XenServer environments.

The following vulnerabilities have been confirmed by the vendors:

  • CVE-2026-23556 (XSA-483): A flaw where oxenstored keeps quota-related use counts across domain destruction. Citrix notes this could allow a privileged user in a guest VM to cause the host to crash or become unresponsive.
  • CVE-2026-23557 (XSA-484): A Denial of Service (DoS) vulnerability via the XS_RESET_WATCHES command in xenstored.
  • CVE-2026-31786 (XSA-485): A Linux kernel out-of-bounds read via a Xen-related sysfs file, potentially leaking sensitive information.
  • CVE-2026-23558 (XSA-486): A race condition in grant table v2 status page mapping. Citrix notes this could allow a privileged user in a guest VM to compromise the host under specific circumstances.
  • CVE-2026-31787 (XSA-487): A Linux kernel double-free in the Xen privcmd driver; as it requires root privileges, the Xen Project considers the crash potential not security-relevant.
  • CVE-2025-54505 (XSA-488): Addresses "Floating Point Divider State Sampling" on certain AMD CPUs. While not a XenServer software vulnerability, this update mitigates a hardware issue to prevent a guest VM from inferring data from a different VM.
  • XAPI RBAC Escalation (XSA-489): This advisory confirms five actionable vulnerabilities: CVE-2026-23559CVE-2026-23560, CVE-2026-23561, CVE-2026-23562, and CVE-2026-42486. Citrix warns that the first three in particular may allow host administrators to gain access beyond the limits of their assigned RBAC role.

The following versions of Citrix Hypervisor / XenServer are affected:

  • Citrix XenServer version 8.4

Note: Citrix XenServer 9.x is currently in Public Preview and not covered by standard security bulletins; as such, it may be affected by these issues.

Initial Advisory (April 24, 2026) #

On April 24, 2026, researchers publicly disclosed an audit identifying 89 exploitable vulnerabilities. These issues primarily involve missing input validation across all writable Map(String,String) fields within eight XAPI object types. Consequently, an attacker with the vm-admin management role "can achieve full host filesystem read/write [access], cross-VM data exfiltration, storage protocol injection, cross-hypervisor lateral movement, and pool-wide compromise through single API calls with no exploit code, no root shell, and no security alerts." These vulnerabilities have persisted since the inception of the XAPI codebase (circa 2006). The researchers assigned the following CVSS severity distribution: 5 critical, 28 high, 46 medium, and 10 low. These vulnerabilities do not currently have CVE IDs assigned.

    What is Citrix XenServer? #

    Citrix XenServer, formerly known as Citrix Hypervisor, is a bare-metal hypervisor based on the open-source Xen project that enables multiple virtual machines to run concurrently on a single physical server.

    What is the impact? #

    Successful exploitation of the vulnerabilities allows a remote, authenticated attacker to gain unauthorized host filesystem control and breach VM isolation boundaries.

    Are updates or workarounds available? #

    For Citrix XenServer versions 8.4 and prior, the vendor recommends updating to the latest version of Citrix XenServer via the Early Access or Normal update channels.

    Note: Citrix XenServer versions 9.x are Public Preview releases and do not receive security bulletins; therefore, users should evaluate their environment's risk and consider migrating to a stable, supported release.

      How to find potentially vulnerable systems with runZero #

      From the Asset Inventory, use the following query to locate potentially impacted assets:

      os:="Citrix XenServer"

      September 2024: CVE-2024-45817 #

      Citrix released a security update to address vulnerabilities in their XenServer and Hypervisor virtualization products.

      Citrix outlines that the following affects both XenServer 8 and Citrix Hypervisor 8.2 CU1 LTSR and could allow a malicious administrator of a guest VM to cause the host to crash or become unresponsive.

      • CVE-2024-45817 has not been rated, but affects how the state of the system could end up in deadlock due to a recursive call guarded by a mutex on x86's APIC (Advanced Programmable Interrupt Controller) architecture when reporting errors to a status.
      In addition to the above, Citrix has indicated that the following vulnerabilities affect XenServer 8 and may allow an attacker on the management network to cause the XenServer host SNMP service to crash or become unresponsive.
      • CVE-2022-24805 is not rated, but affects net-snmp and allows for a classic buffer overflow.
      • CVE-2022-24809 is not rated, but affects net-snmp and allows for a NULL pointer dereference.

      Both of these can be triggered by a user with read-only credentials.

      What is the impact? #

      The vulnerabilities may all be triggered by guest or read-only credentials which increases the likelihood of them occurring.

      Are updates or workarounds available? #

      Citrix recommends limiting access to management interfaces as well as upgrading to one of the following versions:

      How do I find potentially vulnerable systems with runZero? #

      From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

      (product:citrix and type:hypervisor) or product:xenserver

      Written by Matthew Kienow

      Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

      More about Matthew Kienow

      Written by Blain Smith

      Blain Smith is a Security Research Engineer at runZero. He spent most of his career in cloud and distributed systems for AAA gaming, entertainment, and networking working on some of the most popular games and systems millions of people play and watch daily. He has given numerous talks at conferences such as TEDx, GopherCon, and P99CONF. His shift into infosec has afforded him the ability to apply his distributed systems and networking knowledge to other industries such as IoT and OT.

      More about Blain Smith
      Subscribe Now

      Get the latest news and expert insights delivered in your inbox.

      Welcome to the club! Your subscription to our newsletter is successful.

      See Results in Minutes

      See & secure your total attack surface. Even the unknowns & unmanageable.