PatchSiren cyber security CVE debrief
CVE-2016-9379 Citrix CVE debrief
CVE-2016-9379 is a high-severity Xen pygrub issue that can cross the guest-to-host boundary. According to the official record, when pygrub is asked for S-expression output, a guest OS administrator using pygrub can leverage quotes and S-expressions in the bootloader configuration file to read or delete arbitrary files on the host. The risk is limited to local use with elevated guest-side privileges, but the impact reaches host confidentiality and integrity.
- Vendor
- Citrix
- Product
- CVE-2016-9379
- CVSS
- HIGH 7.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Xen and Citrix XenServer operators, especially teams that allow guest OS administrators to use pygrub or manage bootloader configuration files, should prioritize this issue.
Technical summary
NVD classifies the issue under CWE-20 and lists the vulnerable scope as Xen plus Citrix XenServer 6.0.2, 6.2.0, 6.5, and 7.0. The CVSS vector (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N) reflects a local attack requiring high privileges, but with the potential to affect files on the host. The official vendor references point to Xen Security Advisory 198 and a corresponding patch, plus a Citrix support advisory.
Defensive priority
High for environments where guest administrators can influence pygrub or bootloader configuration; otherwise medium. The issue is local and privilege-gated, but it can impact host files directly.
Recommended defensive actions
- Apply the Xen Security Advisory 198 fix and the related vendor updates referenced by Xen and Citrix.
- Review whether pygrub is enabled or reachable for guest administrators, and disable or restrict it where possible.
- Limit guest administrator privileges and separate guest-side management from host-level file access.
- Audit bootloader configuration handling for unsafe parsing of S-expressions and quoted content.
- Verify affected XenServer and Xen deployments against the versions listed in the NVD record.
- Check host file integrity and access controls in environments where pygrub has been used.
Evidence notes
The debrief is based on the NVD CVE record and the linked Xen/Citrix advisories. The supplied record states that pygrub in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file. NVD also lists CWE-20, the affected Xen/Citrix XenServer versions, and the CVSS 3.0 vector.
Official resources
-
CVE-2016-9379 CVE record
CVE.org
-
CVE-2016-9379 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory
CVE published: 2017-01-23T21:59:02.707Z. NVD record modified: 2026-05-13T00:24:29.033Z. No KEV entry was provided in the supplied corpus.