Описание
Windows Kernel Remote Code Execution Vulnerability
FAQ
How do I know if I'm affected by this vulnerability?
This issue allows a single root input/output virtualization (SR-IOV) device which is assigned to a guest to potentially interfere with its Peripheral Component Interface Express (PCIe) siblings which are attached to other guests or to the root.
You will be vulnerable if you implement the following:
- Your Windows instance is hosting virtual machines
- Your Server includes the required hardware with SR-IOV devices
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2016 | ||
Windows Server 2016 (Server Core installation) | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server, version 2004 (Server Core installation) | ||
Windows Server, version 20H2 (Server Core Installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 78%
0.01265
Низкий
9.9 Critical
CVSS3
Связанные уязвимости
CVSS3: 9.9
github
около 3 лет назад
Windows Kernel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34508.
CVSS3: 9.9
fstec
почти 4 года назад
Уязвимость ядра операционных систем Microsoft Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 78%
0.01265
Низкий
9.9 Critical
CVSS3