Описание
Windows Hyper-V Remote Code Execution Vulnerability
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows 10 Version 1909 for x64-based Systems | ||
Windows Server, version 20H2 (Server Core Installation) | ||
Windows 10 Version 21H1 for x64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
7.9 High
CVSS3
Связанные уязвимости
Windows Hyper-V Remote Code Execution Vulnerability.
Уязвимость системы аппаратной виртуализации Hyper-V операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
7.9 High
CVSS3