Xcp Ng 8.3 · Version Status
Xcp Ng 8.3 End of Life Date
Xcp Ng 8.3 end-of-life date, support status, and CVE risk. Data from endoflife.date and official vendor documentation.
✓
Xcp Ng 8.3 is actively supported. EOL date: November 30, 2028.
EOL Date
Nov 30, 2028
936 days remaining
Latest Release
8.3.0
Standard release
Release Date
Oct 7, 2024
Xcp Ng 8.3 series
| Version | Latest | EOL Date | Status |
| 7.4 |
7.4.0 |
Oct 31, 2018 |
EOL |
| 7.5 |
7.5.0 |
Jul 25, 2019 |
EOL |
| 7.6 |
7.6.0 |
Mar 30, 2020 |
EOL |
| 8.0 |
8.0.0 |
Nov 13, 2020 |
EOL |
| 8.1 |
8.1.0 |
Mar 31, 2021 |
EOL |
| 8.2 LTS |
8.2.1 |
Jun 25, 2025 |
EOL |
| → 8.3 |
8.3.0 |
Nov 30, 2028 |
Active |
What does Xcp Ng 8.3 end of life mean?
When Xcp Ng 8.3 reaches end of life, the maintainers stop issuing security patches for this version. CVEs discovered after the EOL date are publicly disclosed on the National Vulnerability Database with no patch available. Exploit code frequently appears on GitHub within days of disclosure.
The CVE blind spot: Most vulnerability scanners check for known CVEs but do not flag the ongoing accumulation of unpatched vulnerabilities in EOL software versions. Running Xcp Ng 8.3 past its EOL date creates a permanently growing attack surface that standard security tooling will not surface.
Migrate to Xcp Ng 8.3 or implement compensating controls — network segmentation, enhanced monitoring, restricted access — while migration is underway.
Frequently Asked Questions
When does Xcp Ng 8.3 reach end of life?
Xcp Ng 8.3 reached end of life on November 30, 2028. That is 936 days remaining.
Is Xcp Ng 8.3 still supported?
Yes, Xcp Ng 8.3 is currently supported. The EOL date is November 30, 2028.
What should I upgrade to from Xcp Ng 8.3?
The recommended upgrade from Xcp Ng 8.3 is
Xcp Ng 8.3 — the latest actively supported version. Check the
Xcp Ng full timeline for all supported versions.
What are the security risks of running Xcp Ng 8.3 past EOL?
When Xcp Ng 8.3 reaches end of life, the maintainers stop issuing security patches. Any CVEs disclosed after the EOL date accumulate with no remediation path. Most vulnerability scanners do not flag this — it is the CVE blind spot. Organizations running EOL Xcp Ng should migrate immediately or implement compensating controls.