Описание
Windows Hyper-V Remote Code Execution Vulnerability
FAQ
How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2016 | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1803 for x64-based Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows 10 Version 1903 for x64-based Systems | ||
Windows Server, version 1903 (Server Core installation) | ||
Windows 10 Version 1909 for x64-based Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 86%
0.02982
Низкий
8.5 High
CVSS3
Связанные уязвимости
CVSS3: 8.5
github
около 3 лет назад
, aka 'Hyper-V Remote Code Execution Vulnerability'.
CVSS3: 9.9
fstec
больше 4 лет назад
Уязвимость операционной системы Windows, связанная с ошибками в коде, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 86%
0.02982
Низкий
8.5 High
CVSS3