Описание
Windows Hyper-V Remote Code Execution Vulnerability
FAQ
How would an attacker exploit this vulnerability?
This vulnerability would require an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to hardware resources on the VM which could result in remote code execution on the host server.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows 10 Version 1809 for x64-based Systems | ||
| Windows Server 2019 | ||
| Windows Server 2019 (Server Core installation) | ||
| Windows 10 Version 1909 for x64-based Systems | ||
| Windows 10 Version 2004 for x64-based Systems | ||
| Windows Server, version 2004 (Server Core installation) | ||
| Windows 10 Version 20H2 for x64-based Systems | ||
| Windows Server, version 20H2 (Server Core Installation) | ||
| Windows 10 Version 21H1 for x64-based Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 79%
0.01257
Низкий
8.5 High
CVSS3
Связанные уязвимости
CVSS3: 8.5
github
больше 3 лет назад
Windows Hyper-V Remote Code Execution Vulnerability
CVSS3: 9.9
fstec
больше 4 лет назад
Уязвимость системы аппаратной виртуализации Hyper-V операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 79%
0.01257
Низкий
8.5 High
CVSS3