Описание
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ
What configurations or versions could be at risk from this vulnerability?
This bypass could affect any Hyper-V configurations that are using Router Guard.
What is the exposure if the vulnerability was bypassed?
Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencing router paths.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 8.1 for x64-based systems | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1803 for x64-based Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 85%
0.02729
Низкий
6.5 Medium
CVSS3
Связанные уязвимости
CVSS3: 6.5
github
около 3 лет назад
Windows Hyper-V Security Feature Bypass Vulnerability
CVSS3: 6.5
fstec
больше 4 лет назад
Уязвимость службы Hyper-V операционной системы Windows, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
Процентиль: 85%
0.02729
Низкий
6.5 Medium
CVSS3