PatchSiren cyber security CVE debrief
CVE-2016-9816 Xen CVE debrief
CVE-2016-9816 describes a denial-of-service issue in Xen on ARM systems where a local guest OS user can cause the host to crash by triggering an asynchronous abort while the hypervisor is running at EL2. NVD rates the issue 6.5 (medium) with local access and high availability impact. The record points to vendor advisory and patch material for Xen, and affected CPEs include Xen 4.7.0 and 4.7.1.
- Vendor
- Xen
- Product
- CVE-2016-9816
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-27
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-27
- Advisory updated
- 2026-05-13
Who should care
Teams operating Xen on ARM hardware, especially platform owners, virtualization administrators, and distro maintainers responsible for patching host hypervisors.
Technical summary
The NVD description states that Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2. NVD lists CVSS v3.0 AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H and CWE-284. The supplied CPE criteria mark Xen 4.7.0 and 4.7.1 as vulnerable, and the reference set includes an oss-security mailing list discussion, Xen Security Advisory 201 (XSA-201), an accompanying patch, and a Gentoo GLSA entry.
Defensive priority
Medium priority: this is a host-denial-of-service vulnerability affecting Xen ARM deployments, so patching is important wherever affected versions are in use, but it is not listed as KEV in the supplied data.
Recommended defensive actions
- Identify Xen ARM hosts and confirm whether they run Xen 4.7.0 or 4.7.1, or another build covered by the vendor advisory.
- Apply the Xen Security Advisory 201 fix or a vendor-provided package update that incorporates the patch.
- Use distribution security advisories, such as the referenced Gentoo GLSA, to verify backported fixes for your platform.
- Treat the issue as a hypervisor availability risk and prioritize remediation on shared or production ARM virtualization hosts.
- After updating, validate the running Xen package/build version against your normal patch-management records.
Evidence notes
This debrief is based only on the supplied NVD record and its referenced vendor and community advisories. The CVE was published on 2017-02-27 and last modified on 2026-05-13 in the supplied data. The source description explicitly mentions a local ARM guest OS user causing a host crash through an asynchronous abort at EL2. The NVD metadata also supplies the severity vector, CWE-284 classification, and vulnerable CPE criteria for Xen 4.7.0 and 4.7.1.
Official resources
-
CVE-2016-9816 CVE record
CVE.org
-
CVE-2016-9816 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Mitigation, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Mitigation, Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
The supplied CVE record shows a publication date of 2017-02-27 and a last modified date of 2026-05-13. The record is marked as modified in NVD and includes vendor and third-party references for mitigation and patching.