Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-34458

Опубликовано: 13 июл. 2021
Источник: msrc
CVSS3: 9.9
EPSS Низкий

Описание

Windows Kernel Remote Code Execution Vulnerability

FAQ

How do I know if I'm affected by this vulnerability?

This issue allows a single root input/output virtualization (SR-IOV) device which is assigned to a guest to potentially interfere with its Peripheral Component Interface Express (PCIe) siblings which are attached to other guests or to the root.

You will be vulnerable if you implement the following:

  1. Your Windows instance is hosting virtual machines
  2. Your Server includes the required hardware with SR-IOV devices

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 78%
0.01265
Низкий

9.9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.9
nvd
почти 4 года назад

Windows Kernel Remote Code Execution Vulnerability

CVSS3: 9.9
github
около 3 лет назад

Windows Kernel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34508.

CVSS3: 9.9
fstec
почти 4 года назад

Уязвимость ядра операционных систем Microsoft Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 78%
0.01265
Низкий

9.9 Critical

CVSS3