Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-30163

Опубликовано: 14 июн. 2022
Источник: msrc
CVSS3: 8.5
EPSS Низкий

Описание

Windows Hyper-V Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code.

Обновления

ПродуктСтатьяОбновление
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows 8.1 for x64-based systems
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for x64-based Systems
Windows Server 2016

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 44%
0.00216
Низкий

8.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
nvd
около 3 лет назад

Windows Hyper-V Remote Code Execution Vulnerability

CVSS3: 8.5
github
около 3 лет назад

Windows Hyper-V Remote Code Execution Vulnerability.

CVSS3: 8.5
fstec
около 3 лет назад

Уязвимость системы аппаратной виртуализации Hyper-V операционных систем Microsoft Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 44%
0.00216
Низкий

8.5 High

CVSS3