Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-21995

Опубликовано: 08 фев. 2022
Источник: msrc
CVSS3: 7.9
EPSS Низкий

Описание

Windows Hyper-V Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.

Обновления

ПродуктСтатьяОбновление
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1809 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 1909 for x64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 21H1 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 74%
0.00841
Низкий

7.9 High

CVSS3

Связанные уязвимости

CVSS3: 7.9
nvd
больше 3 лет назад

Windows Hyper-V Remote Code Execution Vulnerability

CVSS3: 7.9
github
больше 3 лет назад

Windows Hyper-V Remote Code Execution Vulnerability.

CVSS3: 7.9
fstec
больше 3 лет назад

Уязвимость системы аппаратной виртуализации Hyper-V операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 74%
0.00841
Низкий

7.9 High

CVSS3